2009 | ||
---|---|---|
88 | Songbai Lu, Longxuan Li, Kwok-Yan Lam, Lingyan Jia: SAODV: A MANET Routing Protocol that can Withstand Black Hole Attack. CIS (2) 2009: 421-425 | |
87 | Jinyang Shi, Kwok-Yan Lam, Ming Gu, Husheng Li: Reusable Set Constructions Using Randomized Dissolvent Templates for Biometric Security. GLOBECOM 2009: 1-6 | |
86 | Jinyang Shi, Kwok-Yan Lam: MinuCode: A Fixed-Value Representation of Fingerprint Minutiae for Biometric Cryptosystem. ISA 2009: 382-391 | |
85 | Meng Ge, Kwok-Yan Lam: Self-initialized Distributed Certificate Authority for Mobile Ad Hoc Network. ISA 2009: 392-401 | |
84 | Meng Ge, Kwok-Yan Lam, Dieter Gollmann, Siu Leung Chung, C. C. Chang, Jian-Bin Li: A robust certification service for highly dynamic MANET in emergency tasks. Int. J. Communication Systems 22(9): 1177-1197 (2009) | |
2008 | ||
83 | Meng Ge, Kwok-Yan Lam, Jian-Bin Li, Siu Leung Chung: Ubiquitous and Secure Certificate Service for Mobile Ad Hoc Network. EUC (2) 2008: 312-317 | |
82 | Jinyang Shi, Zhiyang You, Ming Gu, Kwok-Yan Lam: Biomapping: Privacy trustworthy biometrics using noninvertible and discriminable constructions. ICPR 2008: 1-4 | |
81 | Hong-Wei Sun, Kwok-Yan Lam, Dieter Gollmann, Siu Leung Chung, Jian-Bin Li, Jia-Guang Sun: Efficient Fingercode Classification. IEICE Transactions 91-D(5): 1252-1260 (2008) | |
2007 | ||
80 | Haiyong Chen, Hongwei Sun, Kwok-Yan Lam: A fast and elastic fingerprint matching algorithm using minutiae-centered circular regions. SECURWARE 2007: 211-215 | |
2006 | ||
79 | Xibin Zhao, Kwok-Yan Lam, Guimin Luo, Siu Leung Chung, Ming Gu: Minimal Threshold Closure. ESORICS 2006: 145-155 | |
78 | Xiaoming Jin, Xinqiang Zuo, Kwok-Yan Lam, Jianmin Wang, Jia-Guang Sun: Efficient Discovery of Emerging Frequent Patterns in ArbitraryWindows on Data Streams. ICDE 2006: 113 | |
77 | Hong-Wei Sun, Kwok-Yan Lam, Ming Gu, Jia-Guang Sun: An Efficient Algorithm for Fingercode-Based Biometric Identification. OTM Workshops (1) 2006: 469-478 | |
2005 | ||
76 | Mo Chen, Jian-Tao Sun, Hua-Jun Zeng, Kwok-Yan Lam: A practical system of keyphrase extraction for web pages. CIKM 2005: 277-278 | |
75 | Guoliang Xie, Mingwei Xu, Kwok-Yan Lam, Qian Wu: The Impact of Mobility Modeling in Mobile IP Multicast Research. ICCNMC 2005: 295-304 | |
74 | Hong-Wei Sun, Kwok-Yan Lam, Siu Leung Chung, Ming Gu, Jia-Guang Sun: An Efficient Anomaly Detection Algorithm for Vector-Based Intrusion Detection Systems. ICCNMC 2005: 817-825 | |
73 | Bangyu Wu, Kwok-Yan Lam, Siu Leung Chung, Huaxiong Wang: Secure Construction of Virtual Organizations in Grid Computing Systems. WINE 2005: 959-968 | |
72 | Chin-Chen Chang, Iuon-Chang Lin, Kwok-Yan Lam: An ID-based multisignature scheme without reblocking and predetermined signing order. Computer Standards & Interfaces 27(4): 407-413 (2005) | |
71 | Hongwei Sun, Kwok-Yan Lam, Siu Leung Chung, Wei-Ming Dong, Ming Gu, Jia-Guang Sun: Efficient vector quantization using genetic algorithm. Neural Computing and Applications 14(3): 203-211 (2005) | |
2004 | ||
70 | Chi-Hung Chi, Kwok-Yan Lam: Content Computing, Advanced Workshop on Content Computing, AWCC 2004, ZhenJiang, JiangSu, China, November 15-17, 2004, Proceedings Springer 2004 | |
69 | Xibin Zhao, Kwok-Yan Lam, Siu Leung Chung, Ming Gu, Jia-Guang Sun: Authorization Mechanisms for Virtual Organizations in Distributed Computing Systems. ACISP 2004: 414-426 | |
68 | Xing-Yun He, Kwok-Yan Lam, Siu Leung Chung, Chi-Hung Chi, Jia-Guang Sun: Real-Time Emulation of Intrusion Victim in HoneyFarm. AWCC 2004: 143-154 | |
67 | Jian-Ping Yong, Kwok-Yan Lam, Siu Leung Chung, Ming Gu, Jia-Guang Sun: Enhancing the Scalability of the Community Authorization Service for Virtual Organizations. AWCC 2004: 182-193 | |
66 | Hong-Wei Sun, Kwok-Yan Lam, Siu Leung Chung, Ming Gu, Jia-Guang Sun: Anomaly Detection in Grid Computing Based on Vector Quantization. GCC 2004: 883-886 | |
65 | Yi-Yuan Huang, Kwok-Yan Lam, Siu Leung Chung, Chi-Hung Chi, Jia-Guang Sun: Application of Content Computing in Honeyfarm. WISA 2004: 211-222 | |
2003 | ||
64 | Zhi Guo, Kwok-Yan Lam, Siu Leung Chung, Ming Gu, Jia-Guang Sun: Efficient Presentation of Multivariate Audit Data for Intrusion Detection of Web-Based Internet Services. ACNS 2003: 63-75 | |
63 | Qinghu Li, Jianmin Wang, Kwok-Yan Lam, Jia-Guang Sun: GridFS: A Web-Based Data Grid with P2P Concepts and Writable Replicas. ICADL 2003: 639-642 | |
62 | Tieyan Li, Huafei Zhu, Kwok-Yan Lam: A Novel Two-Level Trust Model for Grid. ICICS 2003: 214-225 | |
61 | Qinghu Li, Jianmin Wang, Kwok-Yan Lam, Jia-Guang Sun: GridFS: A Web-Based Data Grid for the Distributed Sharing of Educational Resource Files. ICWL 2003: 81-92 | |
60 | Kwok-Yan Lam, Xibin Zhao, Siu Leung Chung, Ming Gu, Jia-Guang Sun: Enhancing Grid Security Infrastructure to Support Mobile Computing Nodes. WISA 2003: 42-54 | |
59 | Kwok-Yan Lam, Siu Leung Chung, Ming Gu, Jia-Guang Sun: Lightweight security for mobile commerce transactions. Computer Communications 26(18): 2052-2060 (2003) | |
58 | Kwok-Yan Lam, Siu Leung Chung, Ming Gu, Jia-Guang Sun: Security middleware for enhancing interoperability of Public Key Infrastructure. Computers & Security 22(6): 535-546 (2003) | |
57 | Ning Cai, Kwok-Yan Lam: On identification secret sharing schemes. Inf. Comput. 184(2): 298-310 (2003) | |
2002 | ||
56 | Tieyan Li, Kwok-Yan Lam: An optimal location update and searching algorithm for tracking mobile agent. AAMAS 2002: 639-646 | |
55 | Tieyan Li, Kwok-Yan Lam: Detecting anomalous agents in mobile agent system: a preliminary approach. AAMAS 2002: 655-656 | |
54 | Chi-Hung Chi, Chen Ding, Kwok-Yan Lam: Context Query in Information Retrieval. ICTAI 2002: 101-106 | |
53 | Chi-Hung Chi, John Sim, Kwok-Yan Lam: Agent Warehouse: A New Paradigm for Mobile Agent Deployment. ICTAI 2002: 455-462 | |
52 | Chi-Hung Chi, Chen Ding, Kwok-Yan Lam: Study for Fusion of Different Sources to Determine Relevance. ICTAI 2002: 515-520 | |
51 | Tieyan Li, Wai-Meng Chew, Kwok-Yan Lam: Defending against Distributed Denial of Service Attacks Using Resistant Mobile Agent Architecture. IPDPS 2002 | |
50 | Chi-Hung Chi, Xiang Li, Kwok-Yan Lam: Understanding the Object Retrieval Dependence of Web Page Access. MASCOTS 2002: 413-420 | |
2001 | ||
49 | Tieyan Li, Kwok-Yan Lam: A Secure Group Solution for Multi-Agent EC System. IPDPS 2001: 169 | |
48 | Kwok-Yan Lam, Francesco Sica: The Weight Distribution of C5(1, n). Des. Codes Cryptography 24(2): 181-191 (2001) | |
47 | Dingfeng Ye, Zongduo Dai, Kwok-Yan Lam: Decomposing Attacks on Asymmetric Cryptography Based on Mapping Compositions. J. Cryptology 14(2): 137-150 (2001) | |
2000 | ||
46 | Huaxiong Wang, Kwok-Yan Lam, Guozhen Xiao, Huanhui Zhao: On Multiplicative Secret Sharing Schemes. ACISP 2000: 342-351 | |
45 | Arrianto Mukti Wibowo, Kwok-Yan Lam, Gary S. H. Tan: Loyalty Program Scheme for Anonymous Payment System. EC-Web 2000: 253-265 | |
44 | Tieyan Li, Chuk-Yang Seng, Kwok-Yan Lam: A Secure Route Structure for Information Gathering Agent. PRIMA 2000: 101-114 | |
43 | Cunsheng Ding, Tor Helleseth, Kwok-Yan Lam: Duadic sequences of prime lengths. Discrete Mathematics 218(1-3): 33-49 (2000) | |
42 | Chaoping Xing, Huaxiong Wang, Kwok-Yan Lam: Constructions of authentication codes from algebraic curves over finite fields. IEEE Transactions on Information Theory 46(3): 886-892 (2000) | |
41 | Guozhen Xiao, Shimin Wei, Kwok-Yan Lam, Kyoki Imamura: A fast algorithm for determining the linear complexity of a sequence with period pn over GF(q). IEEE Transactions on Information Theory 46(6): 2203-2206 (2000) | |
1999 | ||
40 | Kwok-Yan Lam, Eiji Okamoto, Chaoping Xing: Advances in Cryptology - ASIACRYPT '99, International Conference on the Theory and Applications of Cryptology and Information Security, Singapore, November 14-18, 1999, Proceedings Springer 1999 | |
39 | Chaoping Xing, Kwok-Yan Lam, Zhenghong Wei: A Class of Explicit Perfect Multi-sequences. ASIACRYPT 1999: 299-305 | |
38 | Xiao Feng Wang, Kwok-Yan Lam, Xun Yi, C. Q. Zhang, Eiji Okamoto: Secure Agent-Mediated Auctionlike Negotiation Protocol for Internet Retail Commerce. CIA 1999: 291-302 | |
37 | Dingfeng Ye, Kwok-Yan Lam, Zong-Duo Dai: Cryptanalysis of ``2 R'' Schemes. CRYPTO 1999: 315-325 | |
36 | Reihaneh Safavi-Naini, Huaxiong Wang, Kwok-Yan Lam: A New Approach to Robust Threshold RSA Signature Schemes. ICISC 1999: 184-196 | |
35 | Sufatrio, Kwok-Yan Lam: Mobile IP Registration Protocol: A Security Attack and New Secure Minimal Public-Key Based Authentication. ISPAN 1999: 364-369 | |
34 | Sufatrio, Kwok-Yan Lam: Internet Mobility Support Optimized for Client Access and its Scalable Authentication Framework. MDA 1999: 220-229 | |
33 | Jianying Zhou, Kwok-Yan Lam: A Secure Pay-per View Scheme for Web-Based Video Service. Public Key Cryptography 1999: 315-326 | |
32 | Harald Niederreiter, Chaoping Xing, Kwok-Yan Lam: A New Construction of Algebraic Geometry Codes. Appl. Algebra Eng. Commun. Comput. 9(5): 373-381 (1999) | |
31 | Jianying Zhou, Kwok-Yan Lam: Securing digital signatures for non-repudiation. Computer Communications 22(8): 710-716 (1999) | |
30 | Cunsheng Ding, Kwok-Yan Lam, Chaoping Xing: Construction and Enumeration of All Binary Duadic Codes of Length pm. Fundam. Inform. 38(1-2): 149-161 (1999) | |
29 | Chaoping Xing, Harald Niederreiter, Kwok-Yan Lam: Constructions of Algebraic-Geometry Codes. IEEE Transactions on Information Theory 45(4): 1186-1193 (1999) | |
28 | Chaoping Xing, Kwok-Yan Lam: Sequences with Almost Perfect Linear Complexity Profiles and Curves Over Finite Fields. IEEE Transactions on Information Theory 45(4): 1267-1270 (1999) | |
27 | Chaoping Xing, Harald Niederreiter, Kwok-Yan Lam: A generalization of algebraic-geometry codes. IEEE Transactions on Information Theory 45(7): 2498-2501 (1999) | |
26 | Cunsheng Ding, Tor Helleseth, Kwok-Yan Lam: Several classes of binary sequences with three-level autocorrelation. IEEE Transactions on Information Theory 45(7): 2606-2612 (1999) | |
25 | Chunru Zhang, Kwok-Yan Lam, Sushil Jajodia: Scalable Threshold Closure. Theor. Comput. Sci. 226(1-2): 185-206 (1999) | |
1998 | ||
24 | Xun Yi, Kwok-Yan Lam, Yongfei Han: Differential Cryptanalysis of a Block Cipher. ACISP 1998: 58-67 | |
23 | Zong-Duo Dai, Dingfeng Ye, Kwok-Yan Lam: Weak Invertibiity of Finite Automata and Cryptanalysis on FAPKC. ASIACRYPT 1998: 227-241 | |
22 | Guopei Qiao, Kwok-Yan Lam: RSA Signature Algorithm for Microcontroller Implementation. CARDIS 1998: 353-356 | |
21 | Xiao Feng Wang, Xun Yi, Kwok-Yan Lam, Eiji Okamoto: Secure Information Gathering Agent for Internet Trading. DAI 1998: 183-193 | |
20 | Jianying Zhou, Kwok-Yan Lam: Undeniable Billing in Mobile Communication. MOBICOM 1998: 284-290 | |
19 | Xiao Feng Wang, Kwok-Yan Lam, Xun Yi: Secure Agent-Mediated Mobile Payment. PRIMA 1998: 162-173 | |
18 | Xun Yi, Xiao Feng Wang, Kwok-Yan Lam, Eiji Okamoto, D. Frank Hsu: A Security Auction-Like Negotiation Protocol for Agent-Based Internet Trading. SRDS 1998: 197-203 | |
17 | Xun Yi, Xiao Feng Wang, Kwok-Yan Lam: A Secure Intelligent Trade Agent System. Trends in Distributed Systems for Electronic Commerce 1998: 218-228 | |
16 | Cheng-Hwee You, Jianying Zhou, Kwok-Yan Lam: On the efficient implementation of fair non-repudiation. Computer Communication Review 28(5): 50-60 (1998) | |
1997 | ||
15 | Xun Yi, Kwok-Yan Lam: A New Hash Function Based on Block Cipher. ACISP 1997: 139-146 | |
14 | Xun Yi, Kwok-Yan Lam, Shi Xin Cheng, Xiao Hu You: A New Byte-Oriented Block Cipher. ISW 1997: 209-220 | |
13 | Lucas Chi Kwong Hui, Kwok-Yan Lam, Chee Weng Chea: Global Optimisation in Neural Network Training. Neural Computing and Applications 5(1): 58-64 (1997) | |
1996 | ||
12 | Rynson W. H. Lau, Kwok-Yan Lam, Siu Leung Chung: The Failure of Anti-Hacking Legislation: A Hong Kong Perspective. ACM Conference on Computer and Communications Security 1996: 62-67 | |
11 | Kwok-Yan Lam, San Ling, Lucas Chi Kwong Hui: Efficient Generation of Elliptic Curve Cryptosystems. COCOON 1996: 411-416 | |
10 | Kwok-Yan Lam, Lucas Chi Kwong Hui: Efficient nearer-ancestor algorithm for network routing. Computer Communications 19(12): 1014-1019 (1996) | |
9 | Kwok-Yan Lam, Lucas Chi Kwong Hui: Designing a system infrastructure for distributed programs. Computer Communications 19(9-10): 754-762 (1996) | |
8 | Kwok-Yan Lam, Lucas Chi Kwong Hui, Siu Leung Chung: A data reduction method for intrusion detection. Journal of Systems and Software 33(1): 101-108 (1996) | |
1995 | ||
7 | Lucas Chi Kwong Hui, Kwok-Yan Lam: Analysis and Experimentation on List Update Algorithms. COCOON 1995: 576-581 | |
6 | Kwok-Yan Lam: Replay tolerance of authentication protocols. Computer Communications 18(12): 988-992 (1995) | |
5 | Kwok-Yan Lam, Lucas Chi Kwong Hui, Siu Leung Chung: Multivariate data analysis software for enhancing system security. Journal of Systems and Software 31(3): 267-275 (1995) | |
1993 | ||
4 | Hermann Strack, Kwok-Yan Lam: Context-Dependent Access Control in Distributed Systems. SEC 1993: 137-155 | |
1992 | ||
3 | Kwok-Yan Lam, Dieter Gollmann: Freshness Assurance of Authentication Protocols. ESORICS 1992: 261-272 | |
2 | Kwok-Yan Lam, Thomas Beth: Timely Authentication in Distributed Systems. ESORICS 1992: 293-303 | |
1991 | ||
1 | Kwok-Yan Lam: An Implementation for Small Databases with High Availability. Operating Systems Review 25(4): 77-87 (1991) |