|
Search the dblp DataBase
Lucas Chi Kwong Hui:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Lucas Chi Kwong Hui
Color Set Size Problem with Application to String Matching. [Citation Graph (2, 0)][DBLP] CPM, 1992, pp:230-243 [Conf]
- H. W. Go, P. Y. Chan, Y. Dong, Ai Fen Sui, Siu-Ming Yiu, Lucas Chi Kwong Hui, Victor O. K. Li
Performance evaluation on CRL distribution using flooding in mobile ad hoc networks (MANETs). [Citation Graph (0, 0)][DBLP] ACM Southeast Regional Conference (2), 2005, pp:75-80 [Conf]
- Sherman S. M. Chow, Lucas Chi Kwong Hui, Siu-Ming Yiu, K. P. Chow
Two Improved Partially Blind Signature Schemes from Bilinear Pairings. [Citation Graph (0, 0)][DBLP] ACISP, 2005, pp:316-328 [Conf]
- Richard W. C. Lui, Sherman S. M. Chow, Lucas Chi Kwong Hui, Siu-Ming Yiu
Role Activation Management in Role Based Access Control. [Citation Graph (0, 0)][DBLP] ACISP, 2005, pp:358-369 [Conf]
- Sherman S. M. Chow, Siu-Ming Yiu, Lucas Chi Kwong Hui
Efficient Identity Based Ring Signature. [Citation Graph (0, 0)][DBLP] ACNS, 2005, pp:499-512 [Conf]
- Wai Wan Tsang, Lucas Chi Kwong Hui, K. P. Chow, C. F. Chong, Sam C. W. Tso
Tuning the Collision Test for Power. [Citation Graph (0, 0)][DBLP] ACSC, 2004, pp:23-30 [Conf]
- Lucas Chi Kwong Hui, Kwok-Yan Lam
Analysis and Experimentation on List Update Algorithms. [Citation Graph (0, 0)][DBLP] COCOON, 1995, pp:576-581 [Conf]
- Kwok-Yan Lam, San Ling, Lucas Chi Kwong Hui
Efficient Generation of Elliptic Curve Cryptosystems. [Citation Graph (0, 0)][DBLP] COCOON, 1996, pp:411-416 [Conf]
- Lucas Chi Kwong Hui, K. P. Chow, Kevin K. H. Pun, Siu-Ming Yiu, Wai Wan Tsang, C. F. Chong, H. W. Chan
Risk Management of Corporate Confidential Information in Digital Form. [Citation Graph (0, 0)][DBLP] COMPSAC, 2004, pp:88-89 [Conf]
- Karl R. P. H. Leung, Lucas Chi Kwong Hui
Signature Management in Workflow Systems. [Citation Graph (0, 0)][DBLP] COMPSAC, 1999, pp:424-429 [Conf]
- Karl R. P. H. Leung, Lucas Chi Kwong Hui, Siu-Ming Yiu, Ricky W. M. Tang
Modeling Web Navigation by Statechart. [Citation Graph (0, 0)][DBLP] COMPSAC, 2000, pp:41-47 [Conf]
- Pierre K. Y. Lai, Siu-Ming Yiu, K. P. Chow, C. F. Chong, Lucas Chi Kwong Hui
An Efficient Bloom Filter Based Solution for Multiparty Private Matching. [Citation Graph (0, 0)][DBLP] Security and Management, 2006, pp:286-292 [Conf]
- Richard W. C. Lui, Lucas Chi Kwong Hui, Siu-Ming Yiu, Yan Woo
A model to support fine-grained delegation of authorization. [Citation Graph (0, 0)][DBLP] Security and Management, 2005, pp:208-212 [Conf]
- Yan Woo, Lucas Chi Kwong Hui, K. P. Chow, Siu-Ming Yiu
Dynamic Integrity Verification for Software Self-defense. [Citation Graph (0, 0)][DBLP] Security and Management, 2005, pp:327-333 [Conf]
- Joe C. K. Yau, Lucas Chi Kwong Hui, Bruce S. N. Cheung, Siu-Ming Yiu, Yan Woo, K. W. Lau, Eric H. M. Li
Trustworthy Browsing - A Secure Web Accessing Model. [Citation Graph (0, 0)][DBLP] EEE, 2005, pp:542-547 [Conf]
- Sherman S. M. Chow, Richard W. C. Lui, Lucas Chi Kwong Hui, Siu-Ming Yiu
Identity Based Ring Signature: Why, How and What Next. [Citation Graph (0, 0)][DBLP] EuroPKI, 2005, pp:144-161 [Conf]
- Richard W. C. Lui, Lucas Chi Kwong Hui, Siu-Ming Yiu
Secure Role Activation and Authorization in the Enterprise Environment. [Citation Graph (0, 0)][DBLP] EuroPKI, 2005, pp:22-35 [Conf]
- Karl R. P. H. Leung, Lucas Chi Kwong Hui
Multiple Signature Handling in Workflow Systems. [Citation Graph (0, 0)][DBLP] HICSS, 2000, pp:- [Conf]
- Venus L. S. Cheung, Lucas Chi Kwong Hui, Siu-Ming Yiu, K. P. Chow, Kevin K. H. Pun, Wai Wan Tsang, H. W. Chan, C. F. Chong
Delegation of signing and decryption rights using pki proxy memo. [Citation Graph (0, 0)][DBLP] IASTED Conf. on Software Engineering, 2004, pp:281-285 [Conf]
- Richard W. C. Lui, Lucas Chi Kwong Hui
A model for delegation of accountability. [Citation Graph (0, 0)][DBLP] IASTED Conf. on Software Engineering, 2004, pp:286-291 [Conf]
- Sherman S. M. Chow, Lucas Chi Kwong Hui, Siu-Ming Yiu, K. P. Chow
An e-Lottery Scheme Using Verifiable Random Function. [Citation Graph (0, 0)][DBLP] ICCSA (3), 2005, pp:651-660 [Conf]
- Venus L. S. Cheung, Lucas Chi Kwong Hui, Siu-Ming Yiu
The Delegation Problem and Practical PKI-Based Solutions. [Citation Graph (0, 0)][DBLP] ICEIS (3), 2004, pp:73-84 [Conf]
- Sherman S. M. Chow, Lucas Chi Kwong Hui, Siu-Ming Yiu, K. P. Chow
Secure Hierarchical Identity Based Signature and Its Application. [Citation Graph (0, 0)][DBLP] ICICS, 2004, pp:480-494 [Conf]
- Sherman S. M. Chow, Lucas Chi Kwong Hui, Siu-Ming Yiu
Identity Based Threshold Ring Signature. [Citation Graph (0, 0)][DBLP] ICISC, 2004, pp:218-232 [Conf]
- Sherman S. M. Chow, Siu-Ming Yiu, Lucas Chi Kwong Hui, K. P. Chow
Efficient Forward and Provably Secure ID-Based Signcryption Scheme with Public Verifiability and Public Ciphertext Authenticity. [Citation Graph (0, 0)][DBLP] ICISC, 2003, pp:352-369 [Conf]
- Richard W. C. Lui, Sherman S. M. Chow, Lucas Chi Kwong Hui, Siu-Ming Yiu
Supporting Efficient Authorization in Delegation with Supervision. [Citation Graph (0, 0)][DBLP] ICPADS (2), 2005, pp:240-244 [Conf]
- Ai Fen Sui, Sherman S. M. Chow, Lucas Chi Kwong Hui, Siu-Ming Yiu, K. P. Chow, Wai Wan Tsang, C. F. Chong, Kevin K. H. Pun, H. W. Chan
Separable and Anonymous Identity-Based Key Issuing. [Citation Graph (0, 0)][DBLP] ICPADS (2), 2005, pp:275-279 [Conf]
- Karl R. P. H. Leung, Lucas Chi Kwong Hui, Ricky W. M. Tang
Integrating Different Signature Purposes in Workflow Systems - A Case Study. [Citation Graph (0, 0)][DBLP] ICSC, 1999, pp:360-366 [Conf]
- H. W. Go, Y. Dong, Lucas Chi Kwong Hui, Siu-Ming Yiu, Victor O. K. Li
Applying Forward Security and Threshold Cryptography in Ad Hoc Networks. [Citation Graph (0, 0)][DBLP] International Conference on Wireless Networks, 2004, pp:202-209 [Conf]
- Lucas Chi Kwong Hui, Charles U. Martel
Randomized Competitive Algorithms for Successful and Unsuccessful Search on Self-adjusting Linear Lists. [Citation Graph (0, 0)][DBLP] ISAAC, 1993, pp:426-435 [Conf]
- Lucas Chi Kwong Hui, Charles U. Martel
Analysing Deletions in Competitive Self-Adjusting Linear List. [Citation Graph (0, 0)][DBLP] ISAAC, 1994, pp:433-441 [Conf]
- Eric Y. K. Chan, H. W. Chan, K. M. Chan, Vivien P. S. Chan, Samuel T. Chanson, Matthew M. H. Cheung, C. F. Chong, K. P. Chow, Albert K. T. Hui, Lucas Chi Kwong Hui, Luke C. K. Lam, W. C. Lau, Kevin K. H. Pun, Anthony Y. F. Tsang, Wai Wan Tsang, Sam C. W. Tso, Dit-Yan Yeung, K. Y. Yu
IDR: An Intrusion Detection Router for Defending against Distributed Denial-of-Service (DDoS) Attacks. [Citation Graph (0, 0)][DBLP] ISPAN, 2004, pp:581-586 [Conf]
- Lucas Chi Kwong Hui, K. P. Chow, Siu-Ming Yiu
Tools and Technology for Computer Forensics: Research and Development in Hong Kong (Invited Paper). [Citation Graph (0, 0)][DBLP] ISPEC, 2007, pp:11-19 [Conf]
- Sherman S. M. Chow, Richard W. C. Lui, Lucas Chi Kwong Hui, Siu-Ming Yiu
Identity Based Delegation Network. [Citation Graph (0, 0)][DBLP] Mycrypt, 2005, pp:99-115 [Conf]
- Xiaoyun Wang, Lucas Chi Kwong Hui, K. P. Chow, Wai Wan Tsang, C. F. Chong, H. W. Chan
Secure and Practical Tree-Structure Signature Schemes Based on Discrete Logarithms. [Citation Graph (0, 0)][DBLP] Public Key Cryptography, 2000, pp:167-177 [Conf]
- K. P. Chow, C. F. Chong, Pierre K. Y. Lai, Lucas Chi Kwong Hui, Kevin K. H. Pun, Wai Wan Tsang, H. W. Chan
Digital Evidence Search Kit. [Citation Graph (0, 0)][DBLP] SADFE, 2005, pp:187-194 [Conf]
- Sherman S. M. Chow, Tsz Hon Yuen, Lucas Chi Kwong Hui, Siu-Ming Yiu
Signcryption in Hierarchical Identity Based Cryptosystem. [Citation Graph (0, 0)][DBLP] SEC, 2005, pp:443-457 [Conf]
- Lucas Chi Kwong Hui, Charles U. Martel
On Efficient Unsuccessful Search. [Citation Graph (0, 0)][DBLP] SODA, 1992, pp:217-227 [Conf]
- Lucas Chi Kwong Hui, Charles U. Martel
Randomized Competitive Algorithms for Successful and Unsuccessful Search. [Citation Graph (0, 0)][DBLP] Comput. J., 1996, v:39, n:5, pp:427-439 [Journal]
- Kwok-Yan Lam, Lucas Chi Kwong Hui
Designing a system infrastructure for distributed programs. [Citation Graph (0, 0)][DBLP] Computer Communications, 1996, v:19, n:9-10, pp:754-762 [Journal]
- Kwok-Yan Lam, Lucas Chi Kwong Hui
Efficient nearer-ancestor algorithm for network routing. [Citation Graph (0, 0)][DBLP] Computer Communications, 1996, v:19, n:12, pp:1014-1019 [Journal]
- Sherman S. M. Chow, Lucas Chi Kwong Hui, Siu-Ming Yiu, K. P. Chow
Practical electronic lotteries with offline TTP. [Citation Graph (0, 0)][DBLP] Computer Communications, 2006, v:29, n:15, pp:2830-2840 [Journal]
- Lucas Chi Kwong Hui, Charles U. Martel
Analyzing Self-Adjusting Linear List Algorithms with Deletions and Unsuccessful Searches. [Citation Graph (0, 0)][DBLP] Inf. Process. Lett., 1996, v:58, n:5, pp:231-236 [Journal]
- Zichen Li, Lucas Chi Kwong Hui, K. P. Chow, C. F. Chong, Wai Wan Tsang, H. W. Chan
Security of Tseng-Jan's group signature schemes. [Citation Graph (0, 0)][DBLP] Inf. Process. Lett., 2000, v:75, n:5, pp:187-189 [Journal]
- Lucas Chi Kwong Hui, Charles U. Martel
Unsuccessful Search in Self-Adjusting Data Structures. [Citation Graph (0, 0)][DBLP] J. Algorithms, 1993, v:15, n:3, pp:447-481 [Journal]
- B. Cheung, Lucas Chi Kwong Hui, J. Zhang, Siu-Ming Yiu
SmartTutor: An intelligent tutoring system in web-based adult education. [Citation Graph (0, 0)][DBLP] Journal of Systems and Software, 2003, v:68, n:1, pp:11-25 [Journal]
- Sherman S. M. Chow, Lucas Chi Kwong Hui, Siu-Ming Yiu, K. P. Chow, Richard W. C. Lui
A generic anti-spyware solution by access control list at kernel level. [Citation Graph (0, 0)][DBLP] Journal of Systems and Software, 2005, v:75, n:1-2, pp:227-234 [Journal]
- Kwok-Yan Lam, Lucas Chi Kwong Hui, Siu Leung Chung
A data reduction method for intrusion detection. [Citation Graph (0, 0)][DBLP] Journal of Systems and Software, 1996, v:33, n:1, pp:101-108 [Journal]
- Kwok-Yan Lam, Lucas Chi Kwong Hui, Siu Leung Chung
Multivariate data analysis software for enhancing system security. [Citation Graph (0, 0)][DBLP] Journal of Systems and Software, 1995, v:31, n:3, pp:267-275 [Journal]
- Karl R. P. H. Leung, Lucas Chi Kwong Hui
Handling signature purposes in workflow systems. [Citation Graph (0, 0)][DBLP] Journal of Systems and Software, 2001, v:55, n:3, pp:245-259 [Journal]
- Lucas Chi Kwong Hui, Kwok-Yan Lam, Chee Weng Chea
Global Optimisation in Neural Network Training. [Citation Graph (0, 0)][DBLP] Neural Computing and Applications, 1997, v:5, n:1, pp:58-64 [Journal]
- Eric K. Wang, Joe C. K. Yau, Lucas Chi Kwong Hui, Zoe L. Jiang, Siu-Ming Yiu
A Key-Recovery System for Long-term Encrypted Documents. [Citation Graph (0, 0)][DBLP] EDOC Workshops, 2006, pp:52- [Conf]
- Meiqin Wang, Lin Li, Siu-Ming Yiu, Lucas Chi Kwong Hui, C. F. Chong, K. P. Chow, Wai Wan Tsang, H. W. Chan, Kevin K. H. Pun
A Hybrid Approach for Authenticating MPEG-2 Streaming Data. [Citation Graph (0, 0)][DBLP] MCAM, 2007, pp:203-212 [Conf]
- Y. Dong, Ai Fen Sui, Siu-Ming Yiu, Victor O. K. Li, Lucas Chi Kwong Hui
Providing distributed certificate authority service in cluster-based mobile ad hoc networks. [Citation Graph (0, 0)][DBLP] Computer Communications, 2007, v:30, n:11-12, pp:2442-2452 [Journal]
- Richard W. C. Lui, Lucas Chi Kwong Hui, Siu-Ming Yiu
Delegation with supervision. [Citation Graph (0, 0)][DBLP] Inf. Sci., 2007, v:177, n:19, pp:4014-4030 [Journal]
Authenticated Directed Diffusion. [Citation Graph (, )][DBLP]
Remote Group User Authentication with Forward Secrecy and Key Agreement with Smartcard. [Citation Graph (, )][DBLP]
A New Practical Scheme for Protecting Web Content. [Citation Graph (, )][DBLP]
Two Efficient Proxy Signature Schemes for Delegation Chains with Nonrepudiation and Untraceability. [Citation Graph (, )][DBLP]
A Practical SMS-based Mutual Authentication Protocol for Secure Online Banking. [Citation Graph (, )][DBLP]
An Efficient Cluster-Based Proactive Secret Share Update Scheme for Mobile Ad Hoc Networks. [Citation Graph (, )][DBLP]
Improving Disk Sector Integrity Using K-Dimension Hashing. [Citation Graph (, )][DBLP]
Protecting Digital Legal Professional Privilege (LPP) Data. [Citation Graph (, )][DBLP]
Improving Disk Sector Integrity Using 3-dimension Hashing Scheme. [Citation Graph (, )][DBLP]
RFID Forward Secure Authentication Protocol: Flaw and Solution. [Citation Graph (, )][DBLP]
Chained Threshold Proxy Signature without and with Supervision. [Citation Graph (, )][DBLP]
SPECS: Secure and Privacy Enhancing Communications Schemes for VANETs. [Citation Graph (, )][DBLP]
A new key establishment scheme for wireless sensor networks [Citation Graph (, )][DBLP]
Search in 0.006secs, Finished in 0.421secs
|