Wai-Chung Poon, Kwok-Tung Lo The transportation of VBR-encoded video using deterministic characterization and bandwidth renegotiation. [Citation Graph (0, 0)][DBLP] Computer Communications, 2002, v:25, n:8, pp:731-740 [Journal]
Wai-Chung Poon, Kwok-Tung Lo The study on statistical multiplexing of homogeneous VBR-MPEG video streams. [Citation Graph (0, 0)][DBLP] Computer Communications, 1999, v:22, n:15-16, pp:1457-1467 [Journal]
Wing-Fai Poon, Kwok-Tung Lo, Jian Feng Performance study on implementation of VCR functionality in staggered broadcast video-on-demand systems. [Citation Graph (0, 0)][DBLP] Journal of Systems and Software, 2005, v:75, n:1-2, pp:95-107 [Journal]
Shujun Li, Kwok-Tung Lo Security problems with improper implementations of improved FEA-M. [Citation Graph (0, 0)][DBLP] Journal of Systems and Software, 2007, v:80, n:5, pp:791-794 [Journal]
Xu-Dong Zhang, Jian Feng, Kwok-Tung Lo Image watermarking using tree-based spatial-frequency feature of wavelet transform. [Citation Graph (0, 0)][DBLP] J. Visual Communication and Image Representation, 2003, v:14, n:4, pp:474-491 [Journal]
Design of a Peer-to-Peer Video-on-Demand System with the Consideration of Fault Exception. [Citation Graph (, )][DBLP]
Cryptanalysis of an Image Encryption Scheme Using Cellular Automata Substitution and SCAN. [Citation Graph (, )][DBLP]
On the Security of an MPEG-Video Encryption Scheme Based on Secret Huffman Tables. [Citation Graph (, )][DBLP]
Cryptanalysis of an MPEG-Video Encryption Scheme Based on Secret Huffman Tables [Citation Graph (, )][DBLP]
Security Problems with Improper Implementations of Improved FEA-M [Citation Graph (, )][DBLP]
Breaking a new substitution-diffusion based image cipher using chaotic standard and logistic maps [Citation Graph (, )][DBLP]
Breaking a Chaotic Cryptographic Scheme Based on Composition Maps [Citation Graph (, )][DBLP]
A Differential Cryptanalysis of Yen-Chen-Wu Multimedia Cryptography System (MCS) [Citation Graph (, )][DBLP]
Security analysis of a binary image permutation scheme based on Logistic map [Citation Graph (, )][DBLP]
Breaking a modified substitution-diffusion image cipher based on chaotic standard and logistic maps [Citation Graph (, )][DBLP]
Breaking an image encryption algorithm based on chaos [Citation Graph (, )][DBLP]
Search in 0.009secs, Finished in 0.010secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP