default search action
Lucas C. K. Hui
Person information
- affiliation: University of Hong Kong, Department of Computer Science, Hong Kong
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2021
- [c97]Jing Wen, Siu-Ming Yiu, Lucas C. K. Hui:
Defending Against Model Inversion Attack by Adversarial Examples. CSR 2021: 551-556 - 2020
- [j51]Raphael C.-W. Phan, Masayuki Abe, Lynn Batten, Jung Hee Cheon, Ed Dawson, Steven D. Galbraith, Jian Guo, Lucas C. K. Hui, Kwangjo Kim, Xuejia Lai, Dong Hoon Lee, Mitsuru Matsui, Tsutomu Matsumoto, Shiho Moriai, Phong Q. Nguyen, Dingyi Pei, Duong Hieu Phan, Josef Pieprzyk, Huaxiong Wang, Hank Wolfe, Duncan S. Wong, Tzong-Chen Wu, Bo-Yin Yang, Siu-Ming Yiu, Yu Yu, Jianying Zhou:
Advances in security research in the Asiacrypt region. Commun. ACM 63(4): 76-81 (2020) - [c96]Ke Zhang, Siu-Ming Yiu, Lucas Chi Kwong Hui:
A Light-Weight Crowdsourcing Aggregation in Privacy-Preserving Federated Learning System. IJCNN 2020: 1-8
2010 – 2019
- 2019
- [j50]Cheuk Yu Yeung, Lucas Chi Kwong Hui, Tat Wing Chim, Siu-Ming Yiu, Gongxian Zeng, Jingyue Chen:
Anonymous Counting Problem in Trust Level Warning System for VANET. IEEE Trans. Veh. Technol. 68(1): 34-48 (2019) - 2018
- [j49]Eric Ke Wang, Yueping Li, Yunming Ye, Siu-Ming Yiu, Lucas C. K. Hui:
A Dynamic Trust Framework for Opportunistic Mobile Social Networks. IEEE Trans. Netw. Serv. Manag. 15(1): 319-329 (2018) - [c95]Jing Wen, Lucas C. K. Hui, Siu-Ming Yiu, Ruoqing Zhang:
DCN: Detector-Corrector Network Against Evasion Attacks on Deep Neural Networks. DSN Workshops 2018: 215-221 - [c94]Qian Chen, Qing Liao, Zoe Lin Jiang, Junbin Fang, Siu-Ming Yiu, Guikai Xi, Rong Li, Zhengzhong Yi, Xuan Wang, Lucas C. K. Hui, Dong Liu, En Zhang:
File Fragment Classification Using Grayscale Image Conversion and Deep Learning in Digital Forensics. IEEE Symposium on Security and Privacy Workshops 2018: 140-147 - 2017
- [j48]Jingxuan Wang, Lucas Chi Kwong Hui, Siu-Ming Yiu, Eric Ke Wang, Jun-bin Fang:
A survey on cyber attacks against nonlinear state estimation in power systems of ubiquitous cities. Pervasive Mob. Comput. 39: 52-64 (2017) - [j47]Jingxuan Wang, Lucas C. K. Hui, Siu-Ming Yiu, Gang Zhou, Ruoqing Zhang:
F-DDIA: A Framework for Detecting Data Injection Attacks in Nonlinear Cyber-Physical Systems. Secur. Commun. Networks 2017: 9602357:1-9602357:12 (2017) - [c93]Jingxuan Wang, Wenting Tu, Lucas Chi Kwong Hui, Siu-Ming Yiu, Eric Ke Wang:
Detecting Time Synchronization Attacks in Cyber-Physical Systems with Machine Learning Techniques. ICDCS 2017: 2246-2251 - [c92]Xingmin Cui, Ruiyi He, Lucas C. K. Hui, Siu-Ming Yiu, Gang Zhou, Eric Ke Wang:
Reconstruction of Task Lists from Android Applications. ICISA 2017: 396-403 - [c91]Eric Ke Wang, Li Yan, Zhe Nie, Lucas Chi Kwong Hui:
Analyzing Selfish Behavior in Opportunistic Networks. ISPAN-FCST-ISCC 2017: 218-225 - [c90]Ruoqing Zhang, Chiling Chow, Lucas C. K. Hui:
Crypt-EHRServer: Protecting Confidentiality with Attribute-Based Encryption and Encrypted Query Processing. ISPAN-FCST-ISCC 2017: 234-241 - [c89]Ruoqing Zhang, Lucas Chi Kwong Hui, Siu-Ming Yiu, Xiaoqi Yu, Zechao Liu, Zoe Lin Jiang:
A Traceable Outsourcing CP-ABE Scheme with Attribute Revocation. TrustCom/BigDataSE/ICESS 2017: 363-370 - [p1]Junbin Fang, Zoe Lin Jiang, Sijin Li, Siu-Ming Yiu, Lucas C. K. Hui, Kam-Pui Chow:
Timeline Analysis for Digital Evidence on MTK-Based Shanzhai Mobile Phone. Mobile Security and Privacy 2017: 205-216 - 2016
- [j46]Chengcheng Xu, Shuhui Chen, Jinshu Su, Siu-Ming Yiu, Lucas Chi Kwong Hui:
A Survey on Regular Expression Matching for Deep Packet Inspection: Applications, Algorithms, and Hardware Platforms. IEEE Commun. Surv. Tutorials 18(4): 2991-3029 (2016) - [c88]Jingxuan Wang, Lucas Chi Kwong Hui, Siu-Ming Yiu, Xingmin Cui, Eric Ke Wang, Jun-bin Fang:
A Survey on the Cyber Attacks Against Non-linear State Estimation in Smart Grids. ACISP (1) 2016: 40-56 - [c87]Zoe Lin Jiang, Ruoqing Zhang, Zechao Liu, Siu-Ming Yiu, Lucas C. K. Hui, Xuan Wang, Junbin Fang:
A Revocable Outsourcing Attribute-Based Encryption Scheme. CloudComp 2016: 145-161 - 2015
- [j45]Tat Wing Chim, Siu-Ming Yiu, Victor O. K. Li, Lucas Chi Kwong Hui, Jin Zhong:
PRGA: Privacy-Preserving Recording & Gateway-Assisted Authentication of Power Usage Information for Smart Grid. IEEE Trans. Dependable Secur. Comput. 12(1): 85-97 (2015) - [c86]Jingxuan Wang, Lucas Chi Kwong Hui, Siu-Ming Yiu:
Data Framing Attacks against Nonlinear State Estimation in Smart Grid. GLOBECOM Workshops 2015: 1-6 - [c85]Qiong Wu, Lucas C. K. Hui, Cheuk Yu Yeung, Tat Wing Chim:
Early car collision prediction in VANET. ICCVE 2015: 94-99 - [c84]Xingmin Cui, Jingxuan Wang, Lucas Chi Kwong Hui, Zhongwei Xie, Tian Zeng, Siu-Ming Yiu:
WeChecker: efficient and precise detection of privilege escalation vulnerabilities in Android apps. WISEC 2015: 25:1-25:12 - [e6]Lucas Chi Kwong Hui, S. H. Qing, Elaine Shi, Siu-Ming Yiu:
Information and Communications Security - 16th International Conference, ICICS 2014, Hong Kong, China, December 16-17, 2014, Revised Selected Papers. Lecture Notes in Computer Science 8958, Springer 2015, ISBN 978-3-319-21965-3 [contents] - 2014
- [j44]Pierre K. Y. Lai, Kam-Pui Chow, Lucas Chi Kwong Hui, Siu-Ming Yiu:
Modeling the initial stage of a file sharing process on a BitTorrent network. Peer-to-Peer Netw. Appl. 7(4): 311-319 (2014) - [j43]Jun-bin Fang, Zoe Lin Jiang, Kexin Ren, Yunhan Luo, Zhe Chen, Weiping Liu, Xuan Wang, Xiamu Niu, Siu-Ming Yiu, Lucas Chi Kwong Hui:
Improved key integrity checking for high-speed quantum key distribution using combinatorial group testing with strongly selective family design. Quantum Inf. Process. 13(6): 1425-1435 (2014) - [j42]Yi Jun He, Patrick P. F. Chan, Lucas Chi Kwong Hui, Siu-Ming Yiu:
UFLE: a user-friendly location-free encryption system for mobile users. Secur. Commun. Networks 7(10): 1477-1487 (2014) - [j41]Tat Wing Chim, Siu-Ming Yiu, Lucas Chi Kwong Hui, Victor O. K. Li:
VSPN: VANET-Based Secure and Privacy-Preserving Navigation. IEEE Trans. Computers 63(2): 510-524 (2014) - [c83]Xingmin Cui, Da Yu, Patrick P. F. Chan, Lucas Chi Kwong Hui, Siu-Ming Yiu, Sihan Qing:
CoChecker: Detecting Capability and Sensitive Data Leaks from Component Chains in Android. ACISP 2014: 446-453 - [c82]Cheuk Yu Yeung, W. C. Law, Tat Wing Chim, Siu-Ming Yiu, Victor O. K. Li, Lucas Chi Kwong Hui:
Distributing blackbox data to multiple vehicles in a secure and privacy-preserving manner. ICCVE 2014: 804-809 - [c81]Dan T. F. Chan, Lucas Chi Kwong Hui, Siu-Ming Yiu:
Assessing cryptographic signature schemes from a legal perspective. PST 2014: 322-329 - [e5]Sherman S. M. Chow, Jan Camenisch, Lucas Chi Kwong Hui, Siu-Ming Yiu:
Information Security - 17th International Conference, ISC 2014, Hong Kong, China, October 12-14, 2014. Proceedings. Lecture Notes in Computer Science 8783, Springer 2014, ISBN 978-3-319-13256-3 [contents] - [e4]Sherman S. M. Chow, Joseph K. Liu, Lucas Chi Kwong Hui, Siu-Ming Yiu:
Provable Security - 8th International Conference, ProvSec 2014, Hong Kong, China, October 9-10, 2014. Proceedings. Lecture Notes in Computer Science 8782, Springer 2014, ISBN 978-3-319-12474-2 [contents] - 2013
- [j40]Tat Wing Chim, Siu-Ming Yiu, Lucas Chi Kwong Hui, Victor O. K. Li:
VANET-based secure taxi service. Ad Hoc Networks 11(8): 2381-2390 (2013) - [j39]Yunming Ye, Qingyao Wu, Yan Li, Kam-Pui Chow, Lucas Chi Kwong Hui, Siu-Ming Yiu:
Unknown Chinese word extraction based on variety of overlapping strings. Inf. Process. Manag. 49(2): 497-512 (2013) - [j38]Patrick P. F. Chan, Lucas Chi Kwong Hui, Siu-Ming Yiu:
Heap Graph Based Software Theft Detection. IEEE Trans. Inf. Forensics Secur. 8(1): 101-110 (2013) - [j37]Zoe Lin Jiang, Jun-bin Fang, Frank Y. W. Law, Pierre K. Y. Lai, Ricci S. C. Ieong, Michael Y. K. Kwan, Kam-Pui Chow, Lucas Chi Kwong Hui, Siu-Ming Yiu, Kevin K. H. Pun:
Maintaining Hard Disk Integrity With Digital Legal Professional Privilege (LPP) Data. IEEE Trans. Inf. Forensics Secur. 8(5): 821-828 (2013) - [c80]Y. Liang, Kam-Pui Chow, Lucas Chi Kwong Hui, Jun-bin Fang, Siu-Ming Yiu, Shuhui Hou:
Towards a Better Similarity Measure for Keyword Profiling via Clustering. COMPSAC Workshops 2013: 16-20 - [c79]Tat Wing Chim, Siu-Ming Yiu, Cheuk Yu Yeung, Victor O. K. Li, Lucas C. K. Hui:
Secure, privacy-preserving, distributed motor vehicle event data recorder. ICCVE 2013: 337-342 - [c78]Gang Zhou, Yanbin Tang, Jun-bin Fang, Zoe Lin Jiang, Kam-Pui Chow, Siu-Ming Yiu, Lucas Chi Kwong Hui, Rongsheng Xu, Yonghao Mai, Shuhui Hou, Fei Xu:
Photo Forensics on Shanzhai Mobile Phone. WASA 2013: 454-464 - 2012
- [j36]Tat Wing Chim, Siu-Ming Yiu, Lucas Chi Kwong Hui, Victor O. K. Li:
MLAS: Multiple level authentication scheme for VANETs. Ad Hoc Networks 10(7): 1445-1456 (2012) - [j35]Tat Wing Chim, Siu-Ming Yiu, Lucas Chi Kwong Hui, Victor O. K. Li:
Privacy-preserving advance power reservation. IEEE Commun. Mag. 50(8): 18-23 (2012) - [j34]Changhui Hu, Tat Wing Chim, Siu-Ming Yiu, Lucas Chi Kwong Hui, Victor O. K. Li:
Efficient HMAC-based secure communication for VANETs. Comput. Networks 56(9): 2292-2303 (2012) - [j33]Tat Wing Chim, Jeanno Chin Long Cheung, Siu-Ming Yiu, Lucas Chi Kwong Hui, Victor O. K. Li:
SPCS: Secure and Privacy-Preserving Charging-Station Searching using VANET. J. Information Security 3(1): 59-67 (2012) - [c77]Tsz Hon Yuen, Siu-Ming Yiu, Lucas Chi Kwong Hui:
Fully Leakage-Resilient Signatures with Auxiliary Inputs. ACISP 2012: 294-307 - [c76]Sherman S. M. Chow, Yi Jun He, Lucas Chi Kwong Hui, Siu-Ming Yiu:
SPICE - Simple Privacy-Preserving Identity-Management for Cloud Environment. ACNS 2012: 526-543 - [c75]Echo P. Zhang, Yi Jun He, Lucas Chi Kwong Hui:
Cloud based Privacy Preserving Data Mining with Decision Tree. DATA 2012: 5-14 - [c74]Kin Ying Yu, Tsz Hon Yuen, Sherman S. M. Chow, Siu-Ming Yiu, Lucas Chi Kwong Hui:
PE(AR)2: Privacy-Enhanced Anonymous Authentication with Reputation and Revocation. ESORICS 2012: 679-696 - [c73]Tat Wing Chim, Siu-Ming Yiu, Lucas Chi Kwong Hui, Victor O. K. Li, Tin Wing Mui, Yu Hin Tsang, Chun Kin Kwok, Kwun Yin Yu:
Selling Power Back to the Grid in a Secure and Privacy-Preserving Manner. ICICS 2012: 445-452 - [c72]Jun-bin Fang, Zoe Lin Jiang, Kam-Pui Chow, Siu-Ming Yiu, Lucas Chi Kwong Hui, Gang Zhou, Mengfei He, Yanbin Tang:
Forensic Analysis of Pirated Chinese Shanzhai Mobile Phones. IFIP Int. Conf. Digital Forensics 2012: 129-142 - [c71]Yi Jun He, Tat Wing Chim, Lucas Chi Kwong Hui, Siu-Ming Yiu:
Non-Transferable Proxy Re-Encryption Scheme. NTMS 2012: 1-4 - [c70]Patrick P. F. Chan, Lucas Chi Kwong Hui, Siu-Ming Yiu:
DroidChecker: analyzing android applications for capability leak. WISEC 2012: 125-136 - 2011
- [j32]Tat Wing Chim, Siu-Ming Yiu, Lucas Chi Kwong Hui, Victor O. K. Li:
SPECS: Secure and privacy enhancing communications schemes for VANETs. Ad Hoc Networks 9(2): 189-203 (2011) - [j31]Zoe Lin Jiang, Jun-bin Fang, Lucas Chi Kwong Hui, Siu-Ming Yiu, Kam-Pui Chow, Meng-meng Sheng:
k-Dimensional hashing scheme for hard disk integrity verification in computer forensics. J. Zhejiang Univ. Sci. C 12(10): 809-818 (2011) - [j30]Tat Wing Chim, Siu-Ming Yiu, Lucas Chi Kwong Hui, Victor O. K. Li:
OPQ: OT-Based Private Querying in VANETs. IEEE Trans. Intell. Transp. Syst. 12(4): 1413-1422 (2011) - [c69]Tat Wing Chim, Lucas Chi Kwong Hui, Siu-Ming Yiu, Victor O. K. Li:
MLAS: multiple level authentication scheme for VANETs. AsiaCCS 2011: 471-475 - [c68]Patrick P. F. Chan, Lucas Chi Kwong Hui, Siu-Ming Yiu:
Dynamic Software Birthmark for Java Based on Heap Memory Analysis. Communications and Multimedia Security 2011: 94-107 - [c67]Patrick P. F. Chan, Lucas Chi Kwong Hui, Siu-Ming Yiu:
JSBiRTH: Dynamic JavaScript Birthmark Based on the Run-Time Heap. COMPSAC 2011: 407-412 - [c66]Jeanno Chin Long Cheung, Tat Wing Chim, Siu-Ming Yiu, Victor O. K. Li, Lucas Chi Kwong Hui:
Credential-Based Privacy-Preserving Power Request Scheme for Smart Grid Network. GLOBECOM 2011: 1-5 - [c65]Xueling Zheng, Yiu Ming Lai, Kam-Pui Chow, Lucas Chi Kwong Hui, Siu-Ming Yiu:
Sockpuppet Detection in Online Discussion Forums. IIH-MSP 2011: 374-377 - [c64]Shuhui Hou, Tetsutaro Uehara, Siu-Ming Yiu, Lucas Chi Kwong Hui, Kam-Pui Chow:
Privacy Preserving Confidential Forensic Investigation for Shared or Remote Servers. IIH-MSP 2011: 378-383 - [c63]Yuk-Ming Lai, Xueling Zheng, Kam-Pui Chow, Lucas Chi Kwong Hui, Siu-Ming Yiu:
Automatic Online Monitoring and Data-Mining Internet Forums. IIH-MSP 2011: 384-387 - [c62]Jun-bin Fang, Zoe Lin Jiang, Siu-Ming Yiu, Kam-Pui Chow, Lucas Chi Kwong Hui, Long Chen, Xiamu Niu:
A Dual Cube Hashing Scheme for Solving LPP Integrity Problem. SADFE 2011: 1-7 - [c61]Tat Wing Chim, Siu-Ming Yiu, Lucas Chi Kwong Hui, Victor O. K. Li:
PASS: Privacy-preserving authentication scheme for smart grid network. SmartGridComm 2011: 196-201 - [e3]Bruce S. N. Cheung, Lucas Chi Kwong Hui, Ravi S. Sandhu, Duncan S. Wong:
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, ASIACCS 2011, Hong Kong, China, March 22-24, 2011. ACM 2011, ISBN 978-1-4503-0564-8 [contents] - 2010
- [j29]Meiqin Wang, Xiaoyun Wang, Lucas Chi Kwong Hui:
Differential-algebraic cryptanalysis of reduced-round of Serpent-256. Sci. China Inf. Sci. 53(3): 546-556 (2010) - [j28]Meiqin Wang, Xiaoyun Wang, Kam-Pui Chow, Lucas Chi Kwong Hui:
New Differential Cryptanalytic Results for Reduced-Round CAST-128. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 93-A(12): 2744-2754 (2010) - [c60]Eric Ke Wang, Yunming Ye, Xiaofei Xu, Siu-Ming Yiu, Lucas Chi Kwong Hui, Kam-Pui Chow:
Security Issues and Challenges for Cyber Physical System. GreenCom/CPSCom 2010: 733-738 - [c59]Frank Y. W. Law, Patrick P. F. Chan, Siu-Ming Yiu, Benjamin Tang, Pierre K. Y. Lai, Kam-Pui Chow, Ricci S. C. Ieong, Michael Y. K. Kwan, Wing-Kai Hon, Lucas Chi Kwong Hui:
Identifying Volatile Data from Multiple Memory Dumps in Live Forensics. IFIP Int. Conf. Digital Forensics 2010: 185-194 - [c58]Ying Yang, Kam-Pui Chow, Lucas Chi Kwong Hui, Chunxiao Wang, Lijuan Chen, Zhenya Chen, Jenny Chen:
Forensic Analysis of Popular Chinese Internet Applications. IFIP Int. Conf. Digital Forensics 2010: 285-295 - [i8]Eric Ke Wang, Lucas Chi Kwong Hui, Siu-Ming Yiu:
A new key establishment scheme for wireless sensor networks. CoRR abs/1004.0591 (2010) - [i7]Yi Jun He, Tat Wing Chim, Lucas Chi Kwong Hui, Siu-Ming Yiu:
Non-Transferable Proxy Re-Encryption Scheme for Data Dissemination Control. IACR Cryptol. ePrint Arch. 2010: 192 (2010)
2000 – 2009
- 2009
- [j27]Ying Dong, Tat Wing Chim, Victor O. K. Li, Siu-Ming Yiu, Lucas Chi Kwong Hui:
ARMR: Anonymous routing protocol with multiple routes for communications in mobile ad hoc networks. Ad Hoc Networks 7(8): 1536-1550 (2009) - [j26]Zoe Lin Jiang, Siu-Ming Yiu, Y. Dong, Lucas Chi Kwong Hui, Starsky H. Y. Wong:
Secure Chained Threshold Proxy Signature without and with Supervision. J. Softw. Eng. Appl. 2(4): 267-275 (2009) - [c57]Tat Wing Chim, Siu-Ming Yiu, Lucas Chi Kwong Hui, Zoe Lin Jiang, Victor O. K. Li:
SPECS: Secure and Privacy Enhancing Communications Schemes for VANETs. ADHOCNETS 2009: 160-175 - [c56]Kin Ying Yu, Siu-Ming Yiu, Lucas Chi Kwong Hui:
RFID Forward Secure Authentication Protocol: Flaw and Solution. CISIS 2009: 627-632 - [c55]Eric Ke Wang, Lucas Chi Kwong Hui, Siu-Ming Yiu:
A New Practical Scheme for Protecting Web Content. Security and Management 2009: 62-66 - [c54]Eric Ke Wang, Yi Jun He, Lucas Chi Kwong Hui, Siu-Ming Yiu:
A Practical SMS-based Mutual Authentication Protocol for Secure Online Banking. Security and Management 2009: 179-183 - [c53]Starsky H. Y. Wong, Zoe Lin Jiang, Lucas Chi Kwong Hui, Siu-Ming Yiu:
Two Efficient Proxy Signature Schemes for Delegation Chains with Nonrepudiation and Untraceability. Security and Management 2009: 307-313 - 2008
- [j25]Sherman S. M. Chow, H. W. Go, Lucas Chi Kwong Hui, Siu-Ming Yiu:
Multiplicative Forward-Secure Threshold Signature Scheme. Int. J. Netw. Secur. 7(3): 397-403 (2008) - [c52]Eric Ke Wang, Lucas Chi Kwong Hui, Siu-Ming Yiu:
Authenticated Directed Diffusion. CANS 2008: 366-377 - [c51]Zoe Lin Jiang, Siu-Ming Yiu, Lucas Chi Kwong Hui, Y. Dong, Starsky H. Y. Wong:
Chained Threshold Proxy Signature without and with Supervision. CSSE (3) 2008: 837-840 - [c50]Zoe Lin Jiang, Lucas Chi Kwong Hui, Siu-Ming Yiu:
Improving Disk Sector Integrity Using K-Dimension Hashing. IFIP Int. Conf. Digital Forensics 2008: 87-98 - [c49]Ying Dong, Victor O. K. Li, Siu-Ming Yiu, Lucas Chi Kwong Hui:
Strongly Anonymous Communications in Mobile Ad Hoc Networks. INC 2008: 181-191 - [c48]Frank Y. W. Law, Pierre K. Y. Lai, Zoe Lin Jiang, Ricci S. C. Ieong, Michael Y. K. Kwan, Kam-Pui Chow, Lucas Chi Kwong Hui, Siu-Ming Yiu, C. F. Chong:
Protecting Digital Legal Professional Privilege (LPP) Data. SADFE 2008: 91-101 - [e2]Matthew K. Franklin, Lucas Chi Kwong Hui, Duncan S. Wong:
Cryptology and Network Security, 7th International Conference, CANS 2008, Hong-Kong, China, December 2-4, 2008. Proceedings. Lecture Notes in Computer Science 5339, Springer 2008, ISBN 978-3-540-89640-1 [contents] - 2007
- [j24]Y. Dong, Ai Fen Sui, Siu-Ming Yiu, Victor O. K. Li, Lucas Chi Kwong Hui:
Providing distributed certificate authority service in cluster-based mobile ad hoc networks. Comput. Commun. 30(11-12): 2442-2452 (2007) - [j23]Richard W. C. Lui, Lucas Chi Kwong Hui, Siu-Ming Yiu:
Accountability in organisations. Int. J. Inf. Comput. Secur. 1(3): 237-255 (2007) - [j22]Zichen Li, C. F. Chong, Lucas Chi Kwong Hui, Siu-Ming Yiu, Kam-Pui Chow, Wai Wan Tsang, H. W. Chan, Kevin K. H. Pun:
An Attack on Libert et al.' s ID-based Undeniable Signature Scheme. Int. J. Netw. Secur. 5(2): 220-223 (2007) - [j21]Richard W. C. Lui, Lucas Chi Kwong Hui, Siu-Ming Yiu:
Delegation with supervision. Inf. Sci. 177(19): 4014-4030 (2007) - [c47]Dan T. F. Chan, Siu-Ming Yiu, Lucas Chi Kwong Hui:
Remote Group User Authentication with Forward Secrecy and Key Agreement with Smartcard. Security and Management 2007: 559-565 - [c46]Zoe Lin Jiang, Lucas Chi Kwong Hui, Kam-Pui Chow, Siu-Ming Yiu, Pierre K. Y. Lai:
Improving Disk Sector Integrity Using 3-dimension Hashing Scheme. FGCN (2) 2007: 141-145 - [c45]Ying Dong, Ai Fen Sui, Siu-Ming Yiu, Victor O. K. Li, Lucas Chi Kwong Hui, H. W. Go:
An Efficient Cluster-Based Proactive Secret Share Update Scheme for Mobile Ad Hoc Networks. ICC 2007: 1241-1246 - [c44]Lucas Chi Kwong Hui, Kam-Pui Chow, Siu-Ming Yiu:
Tools and Technology for Computer Forensics: Research and Development in Hong Kong (Invited Paper). ISPEC 2007: 11-19 - [c43]Meiqin Wang, Lin Li, Siu-Ming Yiu, Lucas Chi Kwong Hui, C. F. Chong, Kam-Pui Chow, Wai Wan Tsang, H. W. Chan, Kevin K. H. Pun:
A Hybrid Approach for Authenticating MPEG-2 Streaming Data. MCAM 2007: 203-212 - [c42]Ying Dong, Victor O. K. Li, Lucas Chi Kwong Hui, Siu-Ming Yiu:
Dynamic Distributed Certificate Authority Services for Mobile Ad Hoc Networks. WCNC 2007: 2625-2630 - 2006
- [j20]Sherman S. M. Chow, Lucas Chi Kwong Hui, Siu-Ming Yiu, Kam-Pui Chow:
Practical electronic lotteries with offline TTP. Comput. Commun. 29(15): 2830-2840 (2006) - [j19]Joe Cho-Ki Yau, Lucas Chi Kwong Hui, Siu-Ming Yiu, Bruce S. N. Cheung:
Towards a Secure Copyright Protection Infrastructure for e-Education Material: Principles Learned from Experience. Int. J. Netw. Secur. 2(1): 21-28 (2006) - [j18]Eric Y. K. Chan, H. W. Chan, K. M. Chan, Vivien P. S. Chan, Samuel T. Chanson, Matthew M. H. Cheung, C. F. Chong, Kam-Pui Chow, Albert K. T. Hui, Lucas Chi Kwong Hui, S. K. Ip, Luke C. K. Lam, W. C. Lau, Kevin K. H. Pun, Anthony Y. F. Tsang, Wai Wan Tsang, Sam C. W. Tso, Dit-Yan Yeung, Siu-Ming Yiu, Kwun Yin Yu, W. Ju:
Intrusion Detection Routers: Design, Implementation and Evaluation Using an Experimental Testbed. IEEE J. Sel. Areas Commun. 24(10): 1889-1900 (2006) - [c41]Pierre K. Y. Lai, Siu-Ming Yiu, Kam-Pui Chow, C. F. Chong, Lucas Chi Kwong Hui:
An Efficient Bloom Filter Based Solution for Multiparty Private Matching. Security and Management 2006: 286-292 - [c40]Eric Ke Wang, Joe Cho-Ki Yau, Lucas Chi Kwong Hui, Zoe Lin Jiang, Siu-Ming Yiu:
A Key-Recovery System for Long-term Encrypted Documents. EDOC Workshops 2006: 52 - 2005
- [j17]Sherman S. M. Chow, Lucas Chi Kwong Hui, Siu-Ming Yiu, Kam-Pui Chow:
Forward-secure multisignature and blind signature schemes. Appl. Math. Comput. 168(2): 895-908 (2005) - [j16]Sherman S. M. Chow, Lucas Chi Kwong Hui, Siu-Ming Yiu, Kam-Pui Chow, Richard W. C. Lui:
A generic anti-spyware solution by access control list at kernel level. J. Syst. Softw. 75(1-2): 227-234 (2005) - [c39]H. W. Go, P. Y. Chan, Y. Dong, Ai Fen Sui, Siu-Ming Yiu, Lucas Chi Kwong Hui, Victor O. K. Li:
Performance evaluation on CRL distribution using flooding in mobile ad hoc networks (MANETs). ACM Southeast Regional Conference (2) 2005: 75-80 - [c38]Sherman S. M. Chow, Lucas Chi Kwong Hui, Siu-Ming Yiu, Kam-Pui Chow:
Two Improved Partially Blind Signature Schemes from Bilinear Pairings. ACISP 2005: 316-328 - [c37]Richard W. C. Lui, Sherman S. M. Chow, Lucas Chi Kwong Hui, Siu-Ming Yiu:
Role Activation Management in Role Based Access Control. ACISP 2005: 358-369 - [c36]Sherman S. M. Chow, Siu-Ming Yiu, Lucas Chi Kwong Hui:
Efficient Identity Based Ring Signature. ACNS 2005: 499-512 - [c35]Richard W. C. Lui, Lucas Chi Kwong Hui, Siu-Ming Yiu, Yan Woo:
A model to support fine-grained delegation of authorization. Security and Management 2005: 208-212 - [c34]Yan Woo, Lucas Chi Kwong Hui, Kam-Pui Chow, Siu-Ming Yiu:
Dynamic Integrity Verification for Software Self-defense. Security and Management 2005: 327-333 - [c33]Joe Cho-Ki Yau, Lucas Chi Kwong Hui, Bruce S. N. Cheung, Siu-Ming Yiu, Yan Woo, K. W. Lau, Eric H. M. Li:
Trustworthy Browsing - A Secure Web Accessing Model. EEE 2005: 542-547 - [c32]Richard W. C. Lui, Lucas Chi Kwong Hui, Siu-Ming Yiu:
Secure Role Activation and Authorization in the Enterprise Environment. EuroPKI 2005: 22-35 - [c31]Sherman S. M. Chow, Richard W. C. Lui, Lucas Chi Kwong Hui, Siu-Ming Yiu:
Identity Based Ring Signature: Why, How and What Next. EuroPKI 2005: 144-161 - [c30]Sherman S. M. Chow, Lucas Chi Kwong Hui, Siu-Ming Yiu, Kam-Pui Chow:
An e-Lottery Scheme Using Verifiable Random Function. ICCSA (3) 2005: 651-660 - [c29]Richard W. C. Lui, Sherman S. M. Chow, Lucas Chi Kwong Hui, Siu-Ming Yiu:
Supporting Efficient Authorization in Delegation with Supervision. ICPADS (2) 2005: 240-244 - [c28]Ai Fen Sui, Sherman S. M. Chow, Lucas Chi Kwong Hui, Siu-Ming Yiu, Kam-Pui Chow, Wai Wan Tsang, C. F. Chong, Kevin K. H. Pun, H. W. Chan:
Separable and Anonymous Identity-Based Key Issuing. ICPADS (2) 2005: 275-279 - [c27]Richard W. C. Lui, Siu-Ming Yiu, Lucas Chi Kwong Hui:
Efficient Authorization in Delegation Chains with Strong Non-Repudiation. IWAP 2005: 66-77 - [c26]Sherman S. M. Chow, Richard W. C. Lui, Lucas Chi Kwong Hui, Siu-Ming Yiu:
Identity Based Delegation Network. Mycrypt 2005: 99-115 - [c25]Kam-Pui Chow, C. F. Chong, Pierre K. Y. Lai, Lucas Chi Kwong Hui, Kevin K. H. Pun, Wai Wan Tsang, H. W. Chan:
Digital Evidence Search Kit. SADFE 2005: 187-194 - [c24]Sherman S. M. Chow, Tsz Hon Yuen, Lucas Chi Kwong Hui, Siu-Ming Yiu:
Signcryption in Hierarchical Identity Based Cryptosystem. SEC 2005: 443-457 - [c23]Y. Dong, H. W. Go, Ai Fen Sui, Victor O. K. Li, Lucas Chi Kwong Hui, Siu-Ming Yiu:
Providing Distributed Certificate Authority Service in Mobile Ad Hoc Networks. SecureComm 2005: 149-156 - [c22]Ai Fen Sui, Lucas Chi Kwong Hui, Siu-Ming Yiu, Kam-Pui Chow, Wai Wan Tsang, C. F. Chong, Kevin K. H. Pun, H. W. Chan:
An improved authenticated key agreement protocol with perfect forward secrecy for wireless mobile communication. WCNC 2005: 2088-2093 - 2004
- [c21]Wai Wan Tsang, Lucas Chi Kwong Hui, Kam-Pui Chow, C. F. Chong, Sam C. W. Tso:
Tuning the Collision Test for Power. ACSC 2004: 23-30 - [c20]Lucas Chi Kwong Hui, Kam-Pui Chow, Kevin K. H. Pun, Siu-Ming Yiu, Wai Wan Tsang, C. F. Chong, H. W. Chan:
Risk Management of Corporate Confidential Information in Digital Form. COMPSAC 2004: 88-89 - [c19]Venus L. S. Cheung, Lucas Chi Kwong Hui, Siu-Ming Yiu, Kam-Pui Chow, Kevin K. H. Pun, Wai Wan Tsang, H. W. Chan, C. F. Chong:
Delegation of signing and decryption rights using pki proxy memo. IASTED Conf. on Software Engineering 2004: 281-285 - [c18]Richard W. C. Lui, Lucas Chi Kwong Hui:
A model for delegation of accountability. IASTED Conf. on Software Engineering 2004: 286-291 - [c17]Venus L. S. Cheung, Lucas Chi Kwong Hui, Siu-Ming Yiu:
The Delegation Problem and Practical PKI-Based Solutions. ICEIS (3) 2004: 73-84 - [c16]Sherman S. M. Chow, Lucas Chi Kwong Hui, Siu-Ming Yiu, Kam-Pui Chow:
Secure Hierarchical Identity Based Signature and Its Application. ICICS 2004: 480-494 - [c15]Sherman S. M. Chow, Lucas Chi Kwong Hui, Siu-Ming Yiu:
Identity Based Threshold Ring Signature. ICISC 2004: 218-232 - [c14]H. W. Go, Y. Dong, Lucas Chi Kwong Hui, Siu-Ming Yiu, Victor O. K. Li:
Applying Forward Security and Threshold Cryptography in Ad Hoc Networks. International Conference on Wireless Networks 2004: 202-209 - [c13]Eric Y. K. Chan, H. W. Chan, K. M. Chan, Vivien P. S. Chan, Samuel T. Chanson, Matthew M. H. Cheung, C. F. Chong, Kam-Pui Chow, Albert K. T. Hui, Lucas Chi Kwong Hui, Luke C. K. Lam, W. C. Lau, Kevin K. H. Pun, Anthony Y. F. Tsang, Wai Wan Tsang, Sam C. W. Tso, Dit-Yan Yeung, Kwun Yin Yu:
IDR: An Intrusion Detection Router for Defending against Distributed Denial-of-Service (DDoS) Attacks. ISPAN 2004: 581-586 - [i6]Sherman S. M. Chow, Lucas Chi Kwong Hui, Siu-Ming Yiu, Kam-Pui Chow:
Two Improved Partially Blind Signature Schemes from Bilinear Pairings. IACR Cryptol. ePrint Arch. 2004: 108 (2004) - [i5]Sherman S. M. Chow, Lucas Chi Kwong Hui, Siu-Ming Yiu:
Identity Based Threshold Ring Signature. IACR Cryptol. ePrint Arch. 2004: 179 (2004) - [i4]Sherman S. M. Chow, Tsz Hon Yuen, Lucas Chi Kwong Hui, Siu-Ming Yiu:
Signcryption in Hierarchical Identity Based Cryptosystem. IACR Cryptol. ePrint Arch. 2004: 244 (2004) - [i3]Ai Fen Sui, Sherman S. M. Chow, Lucas Chi Kwong Hui, Siu-Ming Yiu, Kam-Pui Chow, Wai Wan Tsang, C. F. Chong, Kevin K. H. Pun, H. W. Chan:
Separable and Anonymous Identity-Based Key Issuing. IACR Cryptol. ePrint Arch. 2004: 322 (2004) - [i2]Sherman S. M. Chow, Siu-Ming Yiu, Lucas Chi Kwong Hui:
Efficient Identity Based Ring Signature. IACR Cryptol. ePrint Arch. 2004: 327 (2004) - 2003
- [j15]Bruce S. N. Cheung, Lucas Chi Kwong Hui, Siu-Ming Yiu, J. K. W. Lee, Sylvia L. K. Kwok, Kenneth C. B. Leung:
Content Engineering Agent: A TBL-Based E-Course Development Tool with TQM. Int. J. Distance Educ. Technol. 1(2): 57-71 (2003) - [j14]Joe Cho-Ki Yau, Lucas Chi Kwong Hui, Bruce S. N. Cheung, Siu-Ming Yiu:
eCX: a secure infrastructure for e-course delivery. Internet Res. 13(2): 116-125 (2003) - [j13]Bruce S. N. Cheung, Lucas Chi Kwong Hui, J. Zhang, Siu-Ming Yiu:
SmartTutor: An intelligent tutoring system in web-based adult education. J. Syst. Softw. 68(1): 11-25 (2003) - [c12]Sherman S. M. Chow, Siu-Ming Yiu, Lucas Chi Kwong Hui, Kam-Pui Chow:
Efficient Forward and Provably Secure ID-Based Signcryption Scheme with Public Verifiability and Public Ciphertext Authenticity. ICISC 2003: 352-369 - [i1]Sherman S. M. Chow, Lucas Chi Kwong Hui, Siu-Ming Yiu, Kam-Pui Chow:
A Secure Modified ID-Based Undeniable Signature Scheme. IACR Cryptol. ePrint Arch. 2003: 262 (2003) - 2001
- [j12]Z. C. Li, Lucas Chi Kwong Hui, Kam-Pui Chow, C. F. Chong, Wai Wan Tsang, H. W. Chan:
Security of Wang et al.'s group-oriented (t, n) threshold signature schemes with traceable signers. Inf. Process. Lett. 80(6): 295-298 (2001) - [j11]Karl R. P. H. Leung, Lucas Chi Kwong Hui:
Handling signature purposes in workflow systems. J. Syst. Softw. 55(3): 245-259 (2001) - 2000
- [j10]Zichen Li, Lucas Chi Kwong Hui, Kam-Pui Chow, C. F. Chong, Wai Wan Tsang, H. W. Chan:
Security of Tseng-Jan's group signature schemes. Inf. Process. Lett. 75(5): 187-189 (2000) - [c11]Karl R. P. H. Leung, Lucas Chi Kwong Hui, Siu-Ming Yiu, Ricky W. M. Tang:
Modeling Web Navigation by Statechart. COMPSAC 2000: 41-47 - [c10]Karl R. P. H. Leung, Lucas Chi Kwong Hui:
Multiple Signature Handling in Workflow Systems. HICSS 2000 - [c9]Xiaoyun Wang, Lucas Chi Kwong Hui, Kam-Pui Chow, Wai Wan Tsang, C. F. Chong, H. W. Chan:
Secure and Practical Tree-Structure Signature Schemes Based on Discrete Logarithms. Public Key Cryptography 2000: 167-177
1990 – 1999
- 1999
- [c8]Karl R. P. H. Leung, Lucas Chi Kwong Hui:
Signature Management in Workflow Systems. COMPSAC 1999: 424-429 - [c7]Karl R. P. H. Leung, Lucas Chi Kwong Hui, Ricky W. M. Tang:
Integrating Different Signature Purposes in Workflow Systems - A Case Study. ICSC 1999: 360-366 - [e1]Lucas Chi Kwong Hui, Dik Lun Lee:
Internet Applications, 5th International Computer Science Conference, ICSC'99, Hong Kong, China, December 13-15, 1999, Proceedings. Lecture Notes in Computer Science 1749, Springer 1999, ISBN 3-540-66903-5 [contents] - 1997
- [j9]Lucas Chi Kwong Hui, Kwok-Yan Lam, Chee Weng Chea:
Global Optimisation in Neural Network Training. Neural Comput. Appl. 5(1): 58-64 (1997) - 1996
- [j8]Lucas Chi Kwong Hui, Charles U. Martel:
Randomized Competitive Algorithms for Successful and Unsuccessful Search. Comput. J. 39(5): 427-439 (1996) - [j7]Kwok-Yan Lam, Lucas Chi Kwong Hui:
Designing a system infrastructure for distributed programs. Comput. Commun. 19(9-10): 754-762 (1996) - [j6]Kwok-Yan Lam, Lucas Chi Kwong Hui:
Efficient nearer-ancestor algorithm for network routing. Comput. Commun. 19(12): 1014-1019 (1996) - [j5]Lucas Chi Kwong Hui, Charles U. Martel:
Analyzing Self-Adjusting Linear List Algorithms with Deletions and Unsuccessful Searches. Inf. Process. Lett. 58(5): 231-236 (1996) - [j4]Kwok-Yan Lam, Lucas Chi Kwong Hui, Siu Leung Chung:
A data reduction method for intrusion detection. J. Syst. Softw. 33(1): 101-108 (1996) - [c6]Kwok-Yan Lam, San Ling, Lucas Chi Kwong Hui:
Efficient Generation of Elliptic Curve Cryptosystems. COCOON 1996: 411-416 - 1995
- [j3]Kwok-Yan Lam, Lucas Chi Kwong Hui, Siu Leung Chung:
Multivariate data analysis software for enhancing system security. J. Syst. Softw. 31(3): 267-275 (1995) - [j2]Rudy Setiono, Lucas Chi Kwong Hui:
Use of a quasi-Newton method in a feedforward neural network construction algorithm. IEEE Trans. Neural Networks 6(1): 273-277 (1995) - [c5]Lucas Chi Kwong Hui, Kwok-Yan Lam:
Analysis and Experimentation on List Update Algorithms. COCOON 1995: 576-581 - 1994
- [c4]Lucas Chi Kwong Hui, Charles U. Martel:
Analysing Deletions in Competitive Self-Adjusting Linear List. ISAAC 1994: 433-441 - 1993
- [j1]Lucas Chi Kwong Hui, Charles U. Martel:
Unsuccessful Search in Self-Adjusting Data Structures. J. Algorithms 15(3): 447-481 (1993) - [c3]Lucas Chi Kwong Hui, Charles U. Martel:
Randomized Competitive Algorithms for Successful and Unsuccessful Search on Self-adjusting Linear Lists. ISAAC 1993: 426-435 - 1992
- [c2]Lucas Chi Kwong Hui:
Color Set Size Problem with Application to String Matching. CPM 1992: 230-243 - [c1]Lucas Chi Kwong Hui, Charles U. Martel:
On Efficient Unsuccessful Search. SODA 1992: 217-227
Coauthor Index
aka: Jun-bin Fang
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:45 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint