The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Lucas Chi Kwong Hui: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Lucas Chi Kwong Hui
    Color Set Size Problem with Application to String Matching. [Citation Graph (2, 0)][DBLP]
    CPM, 1992, pp:230-243 [Conf]
  2. H. W. Go, P. Y. Chan, Y. Dong, Ai Fen Sui, Siu-Ming Yiu, Lucas Chi Kwong Hui, Victor O. K. Li
    Performance evaluation on CRL distribution using flooding in mobile ad hoc networks (MANETs). [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference (2), 2005, pp:75-80 [Conf]
  3. Sherman S. M. Chow, Lucas Chi Kwong Hui, Siu-Ming Yiu, K. P. Chow
    Two Improved Partially Blind Signature Schemes from Bilinear Pairings. [Citation Graph (0, 0)][DBLP]
    ACISP, 2005, pp:316-328 [Conf]
  4. Richard W. C. Lui, Sherman S. M. Chow, Lucas Chi Kwong Hui, Siu-Ming Yiu
    Role Activation Management in Role Based Access Control. [Citation Graph (0, 0)][DBLP]
    ACISP, 2005, pp:358-369 [Conf]
  5. Sherman S. M. Chow, Siu-Ming Yiu, Lucas Chi Kwong Hui
    Efficient Identity Based Ring Signature. [Citation Graph (0, 0)][DBLP]
    ACNS, 2005, pp:499-512 [Conf]
  6. Wai Wan Tsang, Lucas Chi Kwong Hui, K. P. Chow, C. F. Chong, Sam C. W. Tso
    Tuning the Collision Test for Power. [Citation Graph (0, 0)][DBLP]
    ACSC, 2004, pp:23-30 [Conf]
  7. Lucas Chi Kwong Hui, Kwok-Yan Lam
    Analysis and Experimentation on List Update Algorithms. [Citation Graph (0, 0)][DBLP]
    COCOON, 1995, pp:576-581 [Conf]
  8. Kwok-Yan Lam, San Ling, Lucas Chi Kwong Hui
    Efficient Generation of Elliptic Curve Cryptosystems. [Citation Graph (0, 0)][DBLP]
    COCOON, 1996, pp:411-416 [Conf]
  9. Lucas Chi Kwong Hui, K. P. Chow, Kevin K. H. Pun, Siu-Ming Yiu, Wai Wan Tsang, C. F. Chong, H. W. Chan
    Risk Management of Corporate Confidential Information in Digital Form. [Citation Graph (0, 0)][DBLP]
    COMPSAC, 2004, pp:88-89 [Conf]
  10. Karl R. P. H. Leung, Lucas Chi Kwong Hui
    Signature Management in Workflow Systems. [Citation Graph (0, 0)][DBLP]
    COMPSAC, 1999, pp:424-429 [Conf]
  11. Karl R. P. H. Leung, Lucas Chi Kwong Hui, Siu-Ming Yiu, Ricky W. M. Tang
    Modeling Web Navigation by Statechart. [Citation Graph (0, 0)][DBLP]
    COMPSAC, 2000, pp:41-47 [Conf]
  12. Pierre K. Y. Lai, Siu-Ming Yiu, K. P. Chow, C. F. Chong, Lucas Chi Kwong Hui
    An Efficient Bloom Filter Based Solution for Multiparty Private Matching. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2006, pp:286-292 [Conf]
  13. Richard W. C. Lui, Lucas Chi Kwong Hui, Siu-Ming Yiu, Yan Woo
    A model to support fine-grained delegation of authorization. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2005, pp:208-212 [Conf]
  14. Yan Woo, Lucas Chi Kwong Hui, K. P. Chow, Siu-Ming Yiu
    Dynamic Integrity Verification for Software Self-defense. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2005, pp:327-333 [Conf]
  15. Joe C. K. Yau, Lucas Chi Kwong Hui, Bruce S. N. Cheung, Siu-Ming Yiu, Yan Woo, K. W. Lau, Eric H. M. Li
    Trustworthy Browsing - A Secure Web Accessing Model. [Citation Graph (0, 0)][DBLP]
    EEE, 2005, pp:542-547 [Conf]
  16. Sherman S. M. Chow, Richard W. C. Lui, Lucas Chi Kwong Hui, Siu-Ming Yiu
    Identity Based Ring Signature: Why, How and What Next. [Citation Graph (0, 0)][DBLP]
    EuroPKI, 2005, pp:144-161 [Conf]
  17. Richard W. C. Lui, Lucas Chi Kwong Hui, Siu-Ming Yiu
    Secure Role Activation and Authorization in the Enterprise Environment. [Citation Graph (0, 0)][DBLP]
    EuroPKI, 2005, pp:22-35 [Conf]
  18. Karl R. P. H. Leung, Lucas Chi Kwong Hui
    Multiple Signature Handling in Workflow Systems. [Citation Graph (0, 0)][DBLP]
    HICSS, 2000, pp:- [Conf]
  19. Venus L. S. Cheung, Lucas Chi Kwong Hui, Siu-Ming Yiu, K. P. Chow, Kevin K. H. Pun, Wai Wan Tsang, H. W. Chan, C. F. Chong
    Delegation of signing and decryption rights using pki proxy memo. [Citation Graph (0, 0)][DBLP]
    IASTED Conf. on Software Engineering, 2004, pp:281-285 [Conf]
  20. Richard W. C. Lui, Lucas Chi Kwong Hui
    A model for delegation of accountability. [Citation Graph (0, 0)][DBLP]
    IASTED Conf. on Software Engineering, 2004, pp:286-291 [Conf]
  21. Sherman S. M. Chow, Lucas Chi Kwong Hui, Siu-Ming Yiu, K. P. Chow
    An e-Lottery Scheme Using Verifiable Random Function. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2005, pp:651-660 [Conf]
  22. Venus L. S. Cheung, Lucas Chi Kwong Hui, Siu-Ming Yiu
    The Delegation Problem and Practical PKI-Based Solutions. [Citation Graph (0, 0)][DBLP]
    ICEIS (3), 2004, pp:73-84 [Conf]
  23. Sherman S. M. Chow, Lucas Chi Kwong Hui, Siu-Ming Yiu, K. P. Chow
    Secure Hierarchical Identity Based Signature and Its Application. [Citation Graph (0, 0)][DBLP]
    ICICS, 2004, pp:480-494 [Conf]
  24. Sherman S. M. Chow, Lucas Chi Kwong Hui, Siu-Ming Yiu
    Identity Based Threshold Ring Signature. [Citation Graph (0, 0)][DBLP]
    ICISC, 2004, pp:218-232 [Conf]
  25. Sherman S. M. Chow, Siu-Ming Yiu, Lucas Chi Kwong Hui, K. P. Chow
    Efficient Forward and Provably Secure ID-Based Signcryption Scheme with Public Verifiability and Public Ciphertext Authenticity. [Citation Graph (0, 0)][DBLP]
    ICISC, 2003, pp:352-369 [Conf]
  26. Richard W. C. Lui, Sherman S. M. Chow, Lucas Chi Kwong Hui, Siu-Ming Yiu
    Supporting Efficient Authorization in Delegation with Supervision. [Citation Graph (0, 0)][DBLP]
    ICPADS (2), 2005, pp:240-244 [Conf]
  27. Ai Fen Sui, Sherman S. M. Chow, Lucas Chi Kwong Hui, Siu-Ming Yiu, K. P. Chow, Wai Wan Tsang, C. F. Chong, Kevin K. H. Pun, H. W. Chan
    Separable and Anonymous Identity-Based Key Issuing. [Citation Graph (0, 0)][DBLP]
    ICPADS (2), 2005, pp:275-279 [Conf]
  28. Karl R. P. H. Leung, Lucas Chi Kwong Hui, Ricky W. M. Tang
    Integrating Different Signature Purposes in Workflow Systems - A Case Study. [Citation Graph (0, 0)][DBLP]
    ICSC, 1999, pp:360-366 [Conf]
  29. H. W. Go, Y. Dong, Lucas Chi Kwong Hui, Siu-Ming Yiu, Victor O. K. Li
    Applying Forward Security and Threshold Cryptography in Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    International Conference on Wireless Networks, 2004, pp:202-209 [Conf]
  30. Lucas Chi Kwong Hui, Charles U. Martel
    Randomized Competitive Algorithms for Successful and Unsuccessful Search on Self-adjusting Linear Lists. [Citation Graph (0, 0)][DBLP]
    ISAAC, 1993, pp:426-435 [Conf]
  31. Lucas Chi Kwong Hui, Charles U. Martel
    Analysing Deletions in Competitive Self-Adjusting Linear List. [Citation Graph (0, 0)][DBLP]
    ISAAC, 1994, pp:433-441 [Conf]
  32. Eric Y. K. Chan, H. W. Chan, K. M. Chan, Vivien P. S. Chan, Samuel T. Chanson, Matthew M. H. Cheung, C. F. Chong, K. P. Chow, Albert K. T. Hui, Lucas Chi Kwong Hui, Luke C. K. Lam, W. C. Lau, Kevin K. H. Pun, Anthony Y. F. Tsang, Wai Wan Tsang, Sam C. W. Tso, Dit-Yan Yeung, K. Y. Yu
    IDR: An Intrusion Detection Router for Defending against Distributed Denial-of-Service (DDoS) Attacks. [Citation Graph (0, 0)][DBLP]
    ISPAN, 2004, pp:581-586 [Conf]
  33. Lucas Chi Kwong Hui, K. P. Chow, Siu-Ming Yiu
    Tools and Technology for Computer Forensics: Research and Development in Hong Kong (Invited Paper). [Citation Graph (0, 0)][DBLP]
    ISPEC, 2007, pp:11-19 [Conf]
  34. Sherman S. M. Chow, Richard W. C. Lui, Lucas Chi Kwong Hui, Siu-Ming Yiu
    Identity Based Delegation Network. [Citation Graph (0, 0)][DBLP]
    Mycrypt, 2005, pp:99-115 [Conf]
  35. Xiaoyun Wang, Lucas Chi Kwong Hui, K. P. Chow, Wai Wan Tsang, C. F. Chong, H. W. Chan
    Secure and Practical Tree-Structure Signature Schemes Based on Discrete Logarithms. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2000, pp:167-177 [Conf]
  36. K. P. Chow, C. F. Chong, Pierre K. Y. Lai, Lucas Chi Kwong Hui, Kevin K. H. Pun, Wai Wan Tsang, H. W. Chan
    Digital Evidence Search Kit. [Citation Graph (0, 0)][DBLP]
    SADFE, 2005, pp:187-194 [Conf]
  37. Sherman S. M. Chow, Tsz Hon Yuen, Lucas Chi Kwong Hui, Siu-Ming Yiu
    Signcryption in Hierarchical Identity Based Cryptosystem. [Citation Graph (0, 0)][DBLP]
    SEC, 2005, pp:443-457 [Conf]
  38. Lucas Chi Kwong Hui, Charles U. Martel
    On Efficient Unsuccessful Search. [Citation Graph (0, 0)][DBLP]
    SODA, 1992, pp:217-227 [Conf]
  39. Lucas Chi Kwong Hui, Charles U. Martel
    Randomized Competitive Algorithms for Successful and Unsuccessful Search. [Citation Graph (0, 0)][DBLP]
    Comput. J., 1996, v:39, n:5, pp:427-439 [Journal]
  40. Kwok-Yan Lam, Lucas Chi Kwong Hui
    Designing a system infrastructure for distributed programs. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 1996, v:19, n:9-10, pp:754-762 [Journal]
  41. Kwok-Yan Lam, Lucas Chi Kwong Hui
    Efficient nearer-ancestor algorithm for network routing. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 1996, v:19, n:12, pp:1014-1019 [Journal]
  42. Sherman S. M. Chow, Lucas Chi Kwong Hui, Siu-Ming Yiu, K. P. Chow
    Practical electronic lotteries with offline TTP. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2006, v:29, n:15, pp:2830-2840 [Journal]
  43. Lucas Chi Kwong Hui, Charles U. Martel
    Analyzing Self-Adjusting Linear List Algorithms with Deletions and Unsuccessful Searches. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 1996, v:58, n:5, pp:231-236 [Journal]
  44. Zichen Li, Lucas Chi Kwong Hui, K. P. Chow, C. F. Chong, Wai Wan Tsang, H. W. Chan
    Security of Tseng-Jan's group signature schemes. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 2000, v:75, n:5, pp:187-189 [Journal]
  45. Lucas Chi Kwong Hui, Charles U. Martel
    Unsuccessful Search in Self-Adjusting Data Structures. [Citation Graph (0, 0)][DBLP]
    J. Algorithms, 1993, v:15, n:3, pp:447-481 [Journal]
  46. B. Cheung, Lucas Chi Kwong Hui, J. Zhang, Siu-Ming Yiu
    SmartTutor: An intelligent tutoring system in web-based adult education. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 2003, v:68, n:1, pp:11-25 [Journal]
  47. Sherman S. M. Chow, Lucas Chi Kwong Hui, Siu-Ming Yiu, K. P. Chow, Richard W. C. Lui
    A generic anti-spyware solution by access control list at kernel level. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 2005, v:75, n:1-2, pp:227-234 [Journal]
  48. Kwok-Yan Lam, Lucas Chi Kwong Hui, Siu Leung Chung
    A data reduction method for intrusion detection. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 1996, v:33, n:1, pp:101-108 [Journal]
  49. Kwok-Yan Lam, Lucas Chi Kwong Hui, Siu Leung Chung
    Multivariate data analysis software for enhancing system security. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 1995, v:31, n:3, pp:267-275 [Journal]
  50. Karl R. P. H. Leung, Lucas Chi Kwong Hui
    Handling signature purposes in workflow systems. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 2001, v:55, n:3, pp:245-259 [Journal]
  51. Lucas Chi Kwong Hui, Kwok-Yan Lam, Chee Weng Chea
    Global Optimisation in Neural Network Training. [Citation Graph (0, 0)][DBLP]
    Neural Computing and Applications, 1997, v:5, n:1, pp:58-64 [Journal]
  52. Eric K. Wang, Joe C. K. Yau, Lucas Chi Kwong Hui, Zoe L. Jiang, Siu-Ming Yiu
    A Key-Recovery System for Long-term Encrypted Documents. [Citation Graph (0, 0)][DBLP]
    EDOC Workshops, 2006, pp:52- [Conf]
  53. Meiqin Wang, Lin Li, Siu-Ming Yiu, Lucas Chi Kwong Hui, C. F. Chong, K. P. Chow, Wai Wan Tsang, H. W. Chan, Kevin K. H. Pun
    A Hybrid Approach for Authenticating MPEG-2 Streaming Data. [Citation Graph (0, 0)][DBLP]
    MCAM, 2007, pp:203-212 [Conf]
  54. Y. Dong, Ai Fen Sui, Siu-Ming Yiu, Victor O. K. Li, Lucas Chi Kwong Hui
    Providing distributed certificate authority service in cluster-based mobile ad hoc networks. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2007, v:30, n:11-12, pp:2442-2452 [Journal]
  55. Richard W. C. Lui, Lucas Chi Kwong Hui, Siu-Ming Yiu
    Delegation with supervision. [Citation Graph (0, 0)][DBLP]
    Inf. Sci., 2007, v:177, n:19, pp:4014-4030 [Journal]

  56. Authenticated Directed Diffusion. [Citation Graph (, )][DBLP]


  57. Remote Group User Authentication with Forward Secrecy and Key Agreement with Smartcard. [Citation Graph (, )][DBLP]


  58. A New Practical Scheme for Protecting Web Content. [Citation Graph (, )][DBLP]


  59. Two Efficient Proxy Signature Schemes for Delegation Chains with Nonrepudiation and Untraceability. [Citation Graph (, )][DBLP]


  60. A Practical SMS-based Mutual Authentication Protocol for Secure Online Banking. [Citation Graph (, )][DBLP]


  61. An Efficient Cluster-Based Proactive Secret Share Update Scheme for Mobile Ad Hoc Networks. [Citation Graph (, )][DBLP]


  62. Improving Disk Sector Integrity Using K-Dimension Hashing. [Citation Graph (, )][DBLP]


  63. Protecting Digital Legal Professional Privilege (LPP) Data. [Citation Graph (, )][DBLP]


  64. Improving Disk Sector Integrity Using 3-dimension Hashing Scheme. [Citation Graph (, )][DBLP]


  65. RFID Forward Secure Authentication Protocol: Flaw and Solution. [Citation Graph (, )][DBLP]


  66. Chained Threshold Proxy Signature without and with Supervision. [Citation Graph (, )][DBLP]


  67. SPECS: Secure and Privacy Enhancing Communications Schemes for VANETs. [Citation Graph (, )][DBLP]


  68. A new key establishment scheme for wireless sensor networks [Citation Graph (, )][DBLP]


Search in 0.006secs, Finished in 0.421secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002