The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Kwok-Yan Lam: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Xun Yi, Kwok-Yan Lam
    A New Hash Function Based on Block Cipher. [Citation Graph (0, 0)][DBLP]
    ACISP, 1997, pp:139-146 [Conf]
  2. Xun Yi, Kwok-Yan Lam, Yongfei Han
    Differential Cryptanalysis of a Block Cipher. [Citation Graph (0, 0)][DBLP]
    ACISP, 1998, pp:58-67 [Conf]
  3. Xi-Bin Zhao, Kwok-Yan Lam, Siu Leung Chung, Ming Gu, Jia-Guang Sun
    Authorization Mechanisms for Virtual Organizations in Distributed Computing Systems. [Citation Graph (0, 0)][DBLP]
    ACISP, 2004, pp:414-426 [Conf]
  4. Huaxiong Wang, Kwok-Yan Lam, Guozhen Xiao, Huanhui Zhao
    On Multiplicative Secret Sharing Schemes. [Citation Graph (0, 0)][DBLP]
    ACISP, 2000, pp:342-351 [Conf]
  5. Zhi Guo, Kwok-Yan Lam, Siu Leung Chung, Ming Gu, Jia-Guang Sun
    Efficient Presentation of Multivariate Audit Data for Intrusion Detection of Web-Based Internet Services. [Citation Graph (0, 0)][DBLP]
    ACNS, 2003, pp:63-75 [Conf]
  6. Zong-Duo Dai, Dingfeng Ye, Kwok-Yan Lam
    Weak Invertibiity of Finite Automata and Cryptanalysis on FAPKC. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1998, pp:227-241 [Conf]
  7. Chaoping Xing, Kwok-Yan Lam, Zhenghong Wei
    A Class of Explicit Perfect Multi-sequences. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1999, pp:299-305 [Conf]
  8. Tieyan Li, Kwok-Yan Lam
    An optimal location update and searching algorithm for tracking mobile agent. [Citation Graph (0, 0)][DBLP]
    AAMAS, 2002, pp:639-646 [Conf]
  9. Tieyan Li, Kwok-Yan Lam
    Detecting anomalous agents in mobile agent system: a preliminary approach. [Citation Graph (0, 0)][DBLP]
    AAMAS, 2002, pp:655-656 [Conf]
  10. Xing-Yun He, Kwok-Yan Lam, Siu Leung Chung, Chi-Hung Chi, Jia-Guang Sun
    Real-Time Emulation of Intrusion Victim in HoneyFarm. [Citation Graph (0, 0)][DBLP]
    AWCC, 2004, pp:143-154 [Conf]
  11. Jian-Ping Yong, Kwok-Yan Lam, Siu Leung Chung, Ming Gu, Jia-Guang Sun
    Enhancing the Scalability of the Community Authorization Service for Virtual Organizations. [Citation Graph (0, 0)][DBLP]
    AWCC, 2004, pp:182-193 [Conf]
  12. Guopei Qiao, Kwok-Yan Lam
    RSA Signature Algorithm for Microcontroller Implementation. [Citation Graph (0, 0)][DBLP]
    CARDIS, 1998, pp:353-356 [Conf]
  13. Rynson W. H. Lau, Kwok-Yan Lam, Siu Leung Chung
    The Failure of Anti-Hacking Legislation: A Hong Kong Perspective. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1996, pp:62-67 [Conf]
  14. Xiao Feng Wang, Kwok-Yan Lam, Xun Yi, C. Q. Zhang, Eiji Okamoto
    Secure Agent-Mediated Auctionlike Negotiation Protocol for Internet Retail Commerce. [Citation Graph (0, 0)][DBLP]
    CIA, 1999, pp:291-302 [Conf]
  15. Mo Chen, Jian-Tao Sun, Hua-Jun Zeng, Kwok-Yan Lam
    A practical system of keyphrase extraction for web pages. [Citation Graph (0, 0)][DBLP]
    CIKM, 2005, pp:277-278 [Conf]
  16. Lucas Chi Kwong Hui, Kwok-Yan Lam
    Analysis and Experimentation on List Update Algorithms. [Citation Graph (0, 0)][DBLP]
    COCOON, 1995, pp:576-581 [Conf]
  17. Kwok-Yan Lam, San Ling, Lucas Chi Kwong Hui
    Efficient Generation of Elliptic Curve Cryptosystems. [Citation Graph (0, 0)][DBLP]
    COCOON, 1996, pp:411-416 [Conf]
  18. Dingfeng Ye, Kwok-Yan Lam, Zong-Duo Dai
    Cryptanalysis of ``2 R'' Schemes. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1999, pp:315-325 [Conf]
  19. Xiao Feng Wang, Xun Yi, Kwok-Yan Lam, Eiji Okamoto
    Secure Information Gathering Agent for Internet Trading. [Citation Graph (0, 0)][DBLP]
    DAI, 1998, pp:183-193 [Conf]
  20. Arrianto Mukti Wibowo, Kwok-Yan Lam, Gary S. H. Tan
    Loyalty Program Scheme for Anonymous Payment System. [Citation Graph (0, 0)][DBLP]
    EC-Web, 2000, pp:253-265 [Conf]
  21. Kwok-Yan Lam, Thomas Beth
    Timely Authentication in Distributed Systems. [Citation Graph (0, 0)][DBLP]
    ESORICS, 1992, pp:293-303 [Conf]
  22. Kwok-Yan Lam, Dieter Gollmann
    Freshness Assurance of Authentication Protocols. [Citation Graph (0, 0)][DBLP]
    ESORICS, 1992, pp:261-272 [Conf]
  23. Xi-Bin Zhao, Kwok-Yan Lam, Guimin Luo, Siu Leung Chung, Ming Gu
    Minimal Threshold Closure. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2006, pp:145-155 [Conf]
  24. Hong-Wei Sun, Kwok-Yan Lam, Siu Leung Chung, Ming Gu, Jia-Guang Sun
    Anomaly Detection in Grid Computing Based on Vector Quantization. [Citation Graph (0, 0)][DBLP]
    GCC, 2004, pp:883-886 [Conf]
  25. Qinghu Li, Jianmin Wang, Kwok-Yan Lam, Jia-Guang Sun
    GridFS: A Web-Based Data Grid with P2P Concepts and Writable Replicas. [Citation Graph (0, 0)][DBLP]
    ICADL, 2003, pp:639-642 [Conf]
  26. Hong-Wei Sun, Kwok-Yan Lam, Siu Leung Chung, Ming Gu, Jia-Guang Sun
    An Efficient Anomaly Detection Algorithm for Vector-Based Intrusion Detection Systems. [Citation Graph (0, 0)][DBLP]
    ICCNMC, 2005, pp:817-825 [Conf]
  27. Guoliang Xie, Mingwei Xu, Kwok-Yan Lam, Qian Wu
    The Impact of Mobility Modeling in Mobile IP Multicast Research. [Citation Graph (0, 0)][DBLP]
    ICCNMC, 2005, pp:295-304 [Conf]
  28. Xiaoming Jin, Xinqiang Zuo, Kwok-Yan Lam, Jianmin Wang, Jia-Guang Sun
    Efficient Discovery of Emerging Frequent Patterns in ArbitraryWindows on Data Streams. [Citation Graph (0, 0)][DBLP]
    ICDE, 2006, pp:113- [Conf]
  29. Tie-Yan Li, Huafei Zhu, Kwok-Yan Lam
    A Novel Two-Level Trust Model for Grid. [Citation Graph (0, 0)][DBLP]
    ICICS, 2003, pp:214-225 [Conf]
  30. Reihaneh Safavi-Naini, Huaxiong Wang, Kwok-Yan Lam
    A New Approach to Robust Threshold RSA Signature Schemes. [Citation Graph (0, 0)][DBLP]
    ICISC, 1999, pp:184-196 [Conf]
  31. Chi-Hung Chi, Chen Ding, Kwok-Yan Lam
    Context Query in Information Retrieval. [Citation Graph (0, 0)][DBLP]
    ICTAI, 2002, pp:101-106 [Conf]
  32. Chi-Hung Chi, Chen Ding, Kwok-Yan Lam
    Study for Fusion of Different Sources to Determine Relevance. [Citation Graph (0, 0)][DBLP]
    ICTAI, 2002, pp:515-520 [Conf]
  33. Chi-Hung Chi, John Sim, Kwok-Yan Lam
    Agent Warehouse: A New Paradigm for Mobile Agent Deployment. [Citation Graph (0, 0)][DBLP]
    ICTAI, 2002, pp:455-462 [Conf]
  34. Qinghu Li, Jianmin Wang, Kwok-Yan Lam, Jia-Guang Sun
    GridFS: A Web-Based Data Grid for the Distributed Sharing of Educational Resource Files. [Citation Graph (0, 0)][DBLP]
    ICWL, 2003, pp:81-92 [Conf]
  35. Xun Yi, Xiao Feng Wang, Kwok-Yan Lam
    A Secure Intelligent Trade Agent System. [Citation Graph (0, 0)][DBLP]
    Trends in Distributed Systems for Electronic Commerce, 1998, pp:218-228 [Conf]
  36. Tieyan Li, Kwok-Yan Lam
    A Secure Group Solution for Multi-Agent EC System. [Citation Graph (0, 0)][DBLP]
    IPDPS, 2001, pp:169- [Conf]
  37. Tieyan Li, Wai-Meng Chew, Kwok-Yan Lam
    Defending against Distributed Denial of Service Attacks Using Resistant Mobile Agent Architecture. [Citation Graph (0, 0)][DBLP]
    IPDPS, 2002, pp:- [Conf]
  38. Sufatrio, Kwok-Yan Lam
    Mobile IP Registration Protocol: A Security Attack and New Secure Minimal Public-Key Based Authentication. [Citation Graph (0, 0)][DBLP]
    ISPAN, 1999, pp:364-369 [Conf]
  39. Xun Yi, Kwok-Yan Lam, Shi Xin Cheng, Xiao Hu You
    A New Byte-Oriented Block Cipher. [Citation Graph (0, 0)][DBLP]
    ISW, 1997, pp:209-220 [Conf]
  40. Chi-Hung Chi, Xiang Li, Kwok-Yan Lam
    Understanding the Object Retrieval Dependence of Web Page Access. [Citation Graph (0, 0)][DBLP]
    MASCOTS, 2002, pp:413-420 [Conf]
  41. Sufatrio, Kwok-Yan Lam
    Internet Mobility Support Optimized for Client Access and its Scalable Authentication Framework. [Citation Graph (0, 0)][DBLP]
    MDA, 1999, pp:220-229 [Conf]
  42. Jianying Zhou, Kwok-Yan Lam
    Undeniable Billing in Mobile Communication. [Citation Graph (0, 0)][DBLP]
    MOBICOM, 1998, pp:284-290 [Conf]
  43. Hong-Wei Sun, Kwok-Yan Lam, Ming Gu, Jia-Guang Sun
    An Efficient Algorithm for Fingercode-Based Biometric Identification. [Citation Graph (0, 0)][DBLP]
    OTM Workshops (1), 2006, pp:469-478 [Conf]
  44. Jianying Zhou, Kwok-Yan Lam
    A Secure Pay-per View Scheme for Web-Based Video Service. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 1999, pp:315-326 [Conf]
  45. Xiao Feng Wang, Kwok-Yan Lam, Xun Yi
    Secure Agent-Mediated Mobile Payment. [Citation Graph (0, 0)][DBLP]
    PRIMA, 1998, pp:162-173 [Conf]
  46. Tieyan Li, Chuk-Yang Seng, Kwok-Yan Lam
    A Secure Route Structure for Information Gathering Agent. [Citation Graph (0, 0)][DBLP]
    PRIMA, 2000, pp:101-114 [Conf]
  47. Hermann Strack, Kwok-Yan Lam
    Context-Dependent Access Control in Distributed Systems. [Citation Graph (0, 0)][DBLP]
    SEC, 1993, pp:137-155 [Conf]
  48. Xun Yi, Xiao Feng Wang, Kwok-Yan Lam, Eiji Okamoto, D. Frank Hsu
    A Security Auction-Like Negotiation Protocol for Agent-Based Internet Trading. [Citation Graph (0, 0)][DBLP]
    Symposium on Reliable Distributed Systems, 1998, pp:197-203 [Conf]
  49. Bangyu Wu, Kwok-Yan Lam, Siu Leung Chung, Huaxiong Wang
    Secure Construction of Virtual Organizations in Grid Computing Systems. [Citation Graph (0, 0)][DBLP]
    WINE, 2005, pp:959-968 [Conf]
  50. Yi-Yuan Huang, Kwok-Yan Lam, Siu Leung Chung, Chi-Hung Chi, Jia-Guang Sun
    Application of Content Computing in Honeyfarm. [Citation Graph (0, 0)][DBLP]
    WISA, 2004, pp:211-222 [Conf]
  51. Kwok-Yan Lam, Xi-Bin Zhao, Siu Leung Chung, Ming Gu, Jia-Guang Sun
    Enhancing Grid Security Infrastructure to Support Mobile Computing Nodes. [Citation Graph (0, 0)][DBLP]
    WISA, 2003, pp:42-54 [Conf]
  52. Harald Niederreiter, Chaoping Xing, Kwok-Yan Lam
    A New Construction of Algebraic Geometry Codes. [Citation Graph (0, 0)][DBLP]
    Appl. Algebra Eng. Commun. Comput., 1999, v:9, n:5, pp:373-381 [Journal]
  53. Kwok-Yan Lam
    Replay tolerance of authentication protocols. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 1995, v:18, n:12, pp:988-992 [Journal]
  54. Kwok-Yan Lam, Siu Leung Chung, Ming Gu, Jia-Guang Sun
    Lightweight security for mobile commerce transactions. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2003, v:26, n:18, pp:2052-2060 [Journal]
  55. Kwok-Yan Lam, Lucas Chi Kwong Hui
    Designing a system infrastructure for distributed programs. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 1996, v:19, n:9-10, pp:754-762 [Journal]
  56. Kwok-Yan Lam, Lucas Chi Kwong Hui
    Efficient nearer-ancestor algorithm for network routing. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 1996, v:19, n:12, pp:1014-1019 [Journal]
  57. Jianying Zhou, Kwok-Yan Lam
    Securing digital signatures for non-repudiation. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 1999, v:22, n:8, pp:710-716 [Journal]
  58. Kwok-Yan Lam, Siu Leung Chung, Ming Gu, Jia-Guang Sun
    Security middleware for enhancing interoperability of Public Key Infrastructure. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2003, v:22, n:6, pp:535-546 [Journal]
  59. Kwok-Yan Lam, Francesco Sica
    The Weight Distribution of C5(1, n). [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 2001, v:24, n:2, pp:181-191 [Journal]
  60. Cunsheng Ding, Tor Helleseth, Kwok-Yan Lam
    Duadic sequences of prime lengths. [Citation Graph (0, 0)][DBLP]
    Discrete Mathematics, 2000, v:218, n:1-3, pp:33-49 [Journal]
  61. Cunsheng Ding, Kwok-Yan Lam, Chaoping Xing
    Construction and Enumeration of All Binary Duadic Codes of Length pm. [Citation Graph (0, 0)][DBLP]
    Fundam. Inform., 1999, v:38, n:1-2, pp:149-161 [Journal]
  62. Ning Cai, Kwok-Yan Lam
    On identification secret sharing schemes. [Citation Graph (0, 0)][DBLP]
    Inf. Comput., 2003, v:184, n:2, pp:298-310 [Journal]
  63. Dingfeng Ye, Zongduo Dai, Kwok-Yan Lam
    Decomposing Attacks on Asymmetric Cryptography Based on Mapping Compositions. [Citation Graph (0, 0)][DBLP]
    J. Cryptology, 2001, v:14, n:2, pp:137-150 [Journal]
  64. Kwok-Yan Lam, Lucas Chi Kwong Hui, Siu Leung Chung
    A data reduction method for intrusion detection. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 1996, v:33, n:1, pp:101-108 [Journal]
  65. Kwok-Yan Lam, Lucas Chi Kwong Hui, Siu Leung Chung
    Multivariate data analysis software for enhancing system security. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 1995, v:31, n:3, pp:267-275 [Journal]
  66. Lucas Chi Kwong Hui, Kwok-Yan Lam, Chee Weng Chea
    Global Optimisation in Neural Network Training. [Citation Graph (0, 0)][DBLP]
    Neural Computing and Applications, 1997, v:5, n:1, pp:58-64 [Journal]
  67. Hongwei Sun, Kwok-Yan Lam, Siu Leung Chung, Wei-Ming Dong, Ming Gu, Jia-Guang Sun
    Efficient vector quantization using genetic algorithm. [Citation Graph (0, 0)][DBLP]
    Neural Computing and Applications, 2005, v:14, n:3, pp:203-211 [Journal]
  68. Kwok-Yan Lam
    An Implementation for Small Databases with High Availability. [Citation Graph (0, 0)][DBLP]
    Operating Systems Review, 1991, v:25, n:4, pp:77-87 [Journal]
  69. Chunru Zhang, Kwok-Yan Lam, Sushil Jajodia
    Scalable Threshold Closure. [Citation Graph (0, 0)][DBLP]
    Theor. Comput. Sci., 1999, v:226, n:1-2, pp:185-206 [Journal]
  70. Cunsheng Ding, Tor Helleseth, Kwok-Yan Lam
    Several classes of binary sequences with three-level autocorrelation. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1999, v:45, n:7, pp:2606-2612 [Journal]
  71. Chaoping Xing, Kwok-Yan Lam
    Sequences with Almost Perfect Linear Complexity Profiles and Curves Over Finite Fields. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1999, v:45, n:4, pp:1267-1270 [Journal]
  72. Chaoping Xing, Harald Niederreiter, Kwok-Yan Lam
    Constructions of Algebraic-Geometry Codes. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1999, v:45, n:4, pp:1186-1193 [Journal]
  73. Chaoping Xing, Harald Niederreiter, Kwok-Yan Lam
    A generalization of algebraic-geometry codes. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1999, v:45, n:7, pp:2498-2501 [Journal]
  74. Chaoping Xing, Huaxiong Wang, Kwok-Yan Lam
    Constructions of authentication codes from algebraic curves over finite fields. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 2000, v:46, n:3, pp:886-892 [Journal]
  75. Guozhen Xiao, Shimin Wei, Kwok-Yan Lam, Kyoki Imamura
    A fast algorithm for determining the linear complexity of a sequence with period pn over GF(q). [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 2000, v:46, n:6, pp:2203-2206 [Journal]

  76. SAODV: A MANET Routing Protocol that can Withstand Black Hole Attack. [Citation Graph (, )][DBLP]


  77. Ubiquitous and Secure Certificate Service for Mobile Ad Hoc Network. [Citation Graph (, )][DBLP]


  78. Biomapping: Privacy trustworthy biometrics using noninvertible and discriminable constructions. [Citation Graph (, )][DBLP]


  79. Reusable Set Constructions Using Randomized Dissolvent Templates for Biometric Security. [Citation Graph (, )][DBLP]


  80. Towards Energy-Efficient Secure Communications Using Biometric Key Distribution in Wireless Biomedical Healthcare Networks. [Citation Graph (, )][DBLP]


  81. A fast and elastic fingerprint matching algorithm using minutiae-centered circular regions. [Citation Graph (, )][DBLP]


  82. Self-initialized Distributed Certificate Authority for Mobile Ad Hoc Network. [Citation Graph (, )][DBLP]


  83. MinuCode: A Fixed-Value Representation of Fingerprint Minutiae for Biometric Cryptosystem. [Citation Graph (, )][DBLP]


  84. On the efficient implementation of fair non-repudiation. [Citation Graph (, )][DBLP]


Search in 0.036secs, Finished in 0.040secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002