| 2008 |
| 80 | EE | Jinyang Shi,
Zhiyang You,
Ming Gu,
Kwok-Yan Lam:
Biomapping: Privacy trustworthy biometrics using noninvertible and discriminable constructions.
ICPR 2008: 1-4 |
| 79 | EE | Hong-Wei Sun,
Kwok-Yan Lam,
Dieter Gollmann,
Siu Leung Chung,
Jian-Bin Li,
Jia-Guang Sun:
Efficient Fingercode Classification.
IEICE Transactions 91-D(5): 1252-1260 (2008) |
| 2007 |
| 78 | EE | Haiyong Chen,
Hongwei Sun,
Kwok-Yan Lam:
A fast and elastic fingerprint matching algorithm using minutiae-centered circular regions.
SECURWARE 2007: 211-215 |
| 2006 |
| 77 | EE | Xibin Zhao,
Kwok-Yan Lam,
Guimin Luo,
Siu Leung Chung,
Ming Gu:
Minimal Threshold Closure.
ESORICS 2006: 145-155 |
| 76 | EE | Xiaoming Jin,
Xinqiang Zuo,
Kwok-Yan Lam,
Jianmin Wang,
Jia-Guang Sun:
Efficient Discovery of Emerging Frequent Patterns in ArbitraryWindows on Data Streams.
ICDE 2006: 113 |
| 75 | EE | Hong-Wei Sun,
Kwok-Yan Lam,
Ming Gu,
Jia-Guang Sun:
An Efficient Algorithm for Fingercode-Based Biometric Identification.
OTM Workshops (1) 2006: 469-478 |
| 2005 |
| 74 | EE | Mo Chen,
Jian-Tao Sun,
Hua-Jun Zeng,
Kwok-Yan Lam:
A practical system of keyphrase extraction for web pages.
CIKM 2005: 277-278 |
| 73 | EE | Guoliang Xie,
Mingwei Xu,
Kwok-Yan Lam,
Qian Wu:
The Impact of Mobility Modeling in Mobile IP Multicast Research.
ICCNMC 2005: 295-304 |
| 72 | EE | Hong-Wei Sun,
Kwok-Yan Lam,
Siu Leung Chung,
Ming Gu,
Jia-Guang Sun:
An Efficient Anomaly Detection Algorithm for Vector-Based Intrusion Detection Systems.
ICCNMC 2005: 817-825 |
| 71 | EE | Bangyu Wu,
Kwok-Yan Lam,
Siu Leung Chung,
Huaxiong Wang:
Secure Construction of Virtual Organizations in Grid Computing Systems.
WINE 2005: 959-968 |
| 70 | EE | Hongwei Sun,
Kwok-Yan Lam,
Siu Leung Chung,
Wei-Ming Dong,
Ming Gu,
Jia-Guang Sun:
Efficient vector quantization using genetic algorithm.
Neural Computing and Applications 14(3): 203-211 (2005) |
| 2004 |
| 69 | | Chi-Hung Chi,
Kwok-Yan Lam:
Content Computing, Advanced Workshop on Content Computing, AWCC 2004, ZhenJiang, JiangSu, China, November 15-17, 2004, Proceedings
Springer 2004 |
| 68 | EE | Xibin Zhao,
Kwok-Yan Lam,
Siu Leung Chung,
Ming Gu,
Jia-Guang Sun:
Authorization Mechanisms for Virtual Organizations in Distributed Computing Systems.
ACISP 2004: 414-426 |
| 67 | EE | Xing-Yun He,
Kwok-Yan Lam,
Siu Leung Chung,
Chi-Hung Chi,
Jia-Guang Sun:
Real-Time Emulation of Intrusion Victim in HoneyFarm.
AWCC 2004: 143-154 |
| 66 | EE | Jian-Ping Yong,
Kwok-Yan Lam,
Siu Leung Chung,
Ming Gu,
Jia-Guang Sun:
Enhancing the Scalability of the Community Authorization Service for Virtual Organizations.
AWCC 2004: 182-193 |
| 65 | EE | Hong-Wei Sun,
Kwok-Yan Lam,
Siu Leung Chung,
Ming Gu,
Jia-Guang Sun:
Anomaly Detection in Grid Computing Based on Vector Quantization.
GCC 2004: 883-886 |
| 64 | EE | Yi-Yuan Huang,
Kwok-Yan Lam,
Siu Leung Chung,
Chi-Hung Chi,
Jia-Guang Sun:
Application of Content Computing in Honeyfarm.
WISA 2004: 211-222 |
| 2003 |
| 63 | EE | Zhi Guo,
Kwok-Yan Lam,
Siu Leung Chung,
Ming Gu,
Jia-Guang Sun:
Efficient Presentation of Multivariate Audit Data for Intrusion Detection of Web-Based Internet Services.
ACNS 2003: 63-75 |
| 62 | EE | Qinghu Li,
Jianmin Wang,
Kwok-Yan Lam,
Jia-Guang Sun:
GridFS: A Web-Based Data Grid with P2P Concepts and Writable Replicas.
ICADL 2003: 639-642 |
| 61 | EE | Tieyan Li,
Huafei Zhu,
Kwok-Yan Lam:
A Novel Two-Level Trust Model for Grid.
ICICS 2003: 214-225 |
| 60 | EE | Qinghu Li,
Jianmin Wang,
Kwok-Yan Lam,
Jia-Guang Sun:
GridFS: A Web-Based Data Grid for the Distributed Sharing of Educational Resource Files.
ICWL 2003: 81-92 |
| 59 | EE | Kwok-Yan Lam,
Xibin Zhao,
Siu Leung Chung,
Ming Gu,
Jia-Guang Sun:
Enhancing Grid Security Infrastructure to Support Mobile Computing Nodes.
WISA 2003: 42-54 |
| 58 | EE | Kwok-Yan Lam,
Siu Leung Chung,
Ming Gu,
Jia-Guang Sun:
Lightweight security for mobile commerce transactions.
Computer Communications 26(18): 2052-2060 (2003) |
| 57 | EE | Kwok-Yan Lam,
Siu Leung Chung,
Ming Gu,
Jia-Guang Sun:
Security middleware for enhancing interoperability of Public Key Infrastructure.
Computers & Security 22(6): 535-546 (2003) |
| 56 | EE | Ning Cai,
Kwok-Yan Lam:
On identification secret sharing schemes.
Inf. Comput. 184(2): 298-310 (2003) |
| 2002 |
| 55 | EE | Tieyan Li,
Kwok-Yan Lam:
An optimal location update and searching algorithm for tracking mobile agent.
AAMAS 2002: 639-646 |
| 54 | EE | Tieyan Li,
Kwok-Yan Lam:
Detecting anomalous agents in mobile agent system: a preliminary approach.
AAMAS 2002: 655-656 |
| 53 | EE | Chi-Hung Chi,
Chen Ding,
Kwok-Yan Lam:
Context Query in Information Retrieval.
ICTAI 2002: 101-106 |
| 52 | EE | Chi-Hung Chi,
John Sim,
Kwok-Yan Lam:
Agent Warehouse: A New Paradigm for Mobile Agent Deployment.
ICTAI 2002: 455-462 |
| 51 | EE | Chi-Hung Chi,
Chen Ding,
Kwok-Yan Lam:
Study for Fusion of Different Sources to Determine Relevance.
ICTAI 2002: 515-520 |
| 50 | EE | Tieyan Li,
Wai-Meng Chew,
Kwok-Yan Lam:
Defending against Distributed Denial of Service Attacks Using Resistant Mobile Agent Architecture.
IPDPS 2002 |
| 49 | EE | Chi-Hung Chi,
Xiang Li,
Kwok-Yan Lam:
Understanding the Object Retrieval Dependence of Web Page Access.
MASCOTS 2002: 413-420 |
| 2001 |
| 48 | | Tieyan Li,
Kwok-Yan Lam:
A Secure Group Solution for Multi-Agent EC System.
IPDPS 2001: 169 |
| 47 | | Kwok-Yan Lam,
Francesco Sica:
The Weight Distribution of C5(1, n).
Des. Codes Cryptography 24(2): 181-191 (2001) |
| 46 | EE | Dingfeng Ye,
Zongduo Dai,
Kwok-Yan Lam:
Decomposing Attacks on Asymmetric Cryptography Based on Mapping Compositions.
J. Cryptology 14(2): 137-150 (2001) |
| 2000 |
| 45 | | Huaxiong Wang,
Kwok-Yan Lam,
Guozhen Xiao,
Huanhui Zhao:
On Multiplicative Secret Sharing Schemes.
ACISP 2000: 342-351 |
| 44 | EE | Arrianto Mukti Wibowo,
Kwok-Yan Lam,
Gary S. H. Tan:
Loyalty Program Scheme for Anonymous Payment System.
EC-Web 2000: 253-265 |
| 43 | EE | Tieyan Li,
Chuk-Yang Seng,
Kwok-Yan Lam:
A Secure Route Structure for Information Gathering Agent.
PRIMA 2000: 101-114 |
| 42 | EE | Cunsheng Ding,
Tor Helleseth,
Kwok-Yan Lam:
Duadic sequences of prime lengths.
Discrete Mathematics 218(1-3): 33-49 (2000) |
| 41 | | Chaoping Xing,
Huaxiong Wang,
Kwok-Yan Lam:
Constructions of authentication codes from algebraic curves over finite fields.
IEEE Transactions on Information Theory 46(3): 886-892 (2000) |
| 40 | | Guozhen Xiao,
Shimin Wei,
Kwok-Yan Lam,
Kyoki Imamura:
A fast algorithm for determining the linear complexity of a sequence with period pn over GF(q).
IEEE Transactions on Information Theory 46(6): 2203-2206 (2000) |
| 1999 |
| 39 | | Kwok-Yan Lam,
Eiji Okamoto,
Chaoping Xing:
Advances in Cryptology - ASIACRYPT '99, International Conference on the Theory and Applications of Cryptology and Information Security, Singapore, November 14-18, 1999, Proceedings
Springer 1999 |
| 38 | | Chaoping Xing,
Kwok-Yan Lam,
Zhenghong Wei:
A Class of Explicit Perfect Multi-sequences.
ASIACRYPT 1999: 299-305 |
| 37 | EE | Xiao Feng Wang,
Kwok-Yan Lam,
Xun Yi,
C. Q. Zhang,
Eiji Okamoto:
Secure Agent-Mediated Auctionlike Negotiation Protocol for Internet Retail Commerce.
CIA 1999: 291-302 |
| 36 | EE | Dingfeng Ye,
Kwok-Yan Lam,
Zong-Duo Dai:
Cryptanalysis of ``2 R'' Schemes.
CRYPTO 1999: 315-325 |
| 35 | | Reihaneh Safavi-Naini,
Huaxiong Wang,
Kwok-Yan Lam:
A New Approach to Robust Threshold RSA Signature Schemes.
ICISC 1999: 184-196 |
| 34 | EE | Sufatrio,
Kwok-Yan Lam:
Mobile IP Registration Protocol: A Security Attack and New Secure Minimal Public-Key Based Authentication.
ISPAN 1999: 364-369 |
| 33 | EE | Sufatrio,
Kwok-Yan Lam:
Internet Mobility Support Optimized for Client Access and its Scalable Authentication Framework.
MDA 1999: 220-229 |
| 32 | EE | Jianying Zhou,
Kwok-Yan Lam:
A Secure Pay-per View Scheme for Web-Based Video Service.
Public Key Cryptography 1999: 315-326 |
| 31 | EE | Harald Niederreiter,
Chaoping Xing,
Kwok-Yan Lam:
A New Construction of Algebraic Geometry Codes.
Appl. Algebra Eng. Commun. Comput. 9(5): 373-381 (1999) |
| 30 | EE | Jianying Zhou,
Kwok-Yan Lam:
Securing digital signatures for non-repudiation.
Computer Communications 22(8): 710-716 (1999) |
| 29 | | Cunsheng Ding,
Kwok-Yan Lam,
Chaoping Xing:
Construction and Enumeration of All Binary Duadic Codes of Length pm.
Fundam. Inform. 38(1-2): 149-161 (1999) |
| 28 | | Chaoping Xing,
Harald Niederreiter,
Kwok-Yan Lam:
Constructions of Algebraic-Geometry Codes.
IEEE Transactions on Information Theory 45(4): 1186-1193 (1999) |
| 27 | | Chaoping Xing,
Kwok-Yan Lam:
Sequences with Almost Perfect Linear Complexity Profiles and Curves Over Finite Fields.
IEEE Transactions on Information Theory 45(4): 1267-1270 (1999) |
| 26 | | Chaoping Xing,
Harald Niederreiter,
Kwok-Yan Lam:
A generalization of algebraic-geometry codes.
IEEE Transactions on Information Theory 45(7): 2498-2501 (1999) |
| 25 | | Cunsheng Ding,
Tor Helleseth,
Kwok-Yan Lam:
Several classes of binary sequences with three-level autocorrelation.
IEEE Transactions on Information Theory 45(7): 2606-2612 (1999) |
| 24 | EE | Chunru Zhang,
Kwok-Yan Lam,
Sushil Jajodia:
Scalable Threshold Closure.
Theor. Comput. Sci. 226(1-2): 185-206 (1999) |
| 1998 |
| 23 | EE | Xun Yi,
Kwok-Yan Lam,
Yongfei Han:
Differential Cryptanalysis of a Block Cipher.
ACISP 1998: 58-67 |
| 22 | EE | Zong-Duo Dai,
Dingfeng Ye,
Kwok-Yan Lam:
Weak Invertibiity of Finite Automata and Cryptanalysis on FAPKC.
ASIACRYPT 1998: 227-241 |
| 21 | | Guopei Qiao,
Kwok-Yan Lam:
RSA Signature Algorithm for Microcontroller Implementation.
CARDIS 1998: 353-356 |
| 20 | | Xiao Feng Wang,
Xun Yi,
Kwok-Yan Lam,
Eiji Okamoto:
Secure Information Gathering Agent for Internet Trading.
DAI 1998: 183-193 |
| 19 | EE | Jianying Zhou,
Kwok-Yan Lam:
Undeniable Billing in Mobile Communication.
MOBICOM 1998: 284-290 |
| 18 | EE | Xiao Feng Wang,
Kwok-Yan Lam,
Xun Yi:
Secure Agent-Mediated Mobile Payment.
PRIMA 1998: 162-173 |
| 17 | | Xun Yi,
Xiao Feng Wang,
Kwok-Yan Lam,
Eiji Okamoto,
D. Frank Hsu:
A Security Auction-Like Negotiation Protocol for Agent-Based Internet Trading.
SRDS 1998: 197-203 |
| 16 | EE | Xun Yi,
Xiao Feng Wang,
Kwok-Yan Lam:
A Secure Intelligent Trade Agent System.
Trends in Distributed Systems for Electronic Commerce 1998: 218-228 |
| 1997 |
| 15 | | Xun Yi,
Kwok-Yan Lam:
A New Hash Function Based on Block Cipher.
ACISP 1997: 139-146 |
| 14 | | Xun Yi,
Kwok-Yan Lam,
Shi Xin Cheng,
Xiao Hu You:
A New Byte-Oriented Block Cipher.
ISW 1997: 209-220 |
| 13 | | Lucas Chi Kwong Hui,
Kwok-Yan Lam,
Chee Weng Chea:
Global Optimisation in Neural Network Training.
Neural Computing and Applications 5(1): 58-64 (1997) |
| 1996 |
| 12 | EE | Rynson W. H. Lau,
Kwok-Yan Lam,
Siu Leung Chung:
The Failure of Anti-Hacking Legislation: A Hong Kong Perspective.
ACM Conference on Computer and Communications Security 1996: 62-67 |
| 11 | | Kwok-Yan Lam,
San Ling,
Lucas Chi Kwong Hui:
Efficient Generation of Elliptic Curve Cryptosystems.
COCOON 1996: 411-416 |
| 10 | EE | Kwok-Yan Lam,
Lucas Chi Kwong Hui:
Efficient nearer-ancestor algorithm for network routing.
Computer Communications 19(12): 1014-1019 (1996) |
| 9 | EE | Kwok-Yan Lam,
Lucas Chi Kwong Hui:
Designing a system infrastructure for distributed programs.
Computer Communications 19(9-10): 754-762 (1996) |
| 8 | EE | Kwok-Yan Lam,
Lucas Chi Kwong Hui,
Siu Leung Chung:
A data reduction method for intrusion detection.
Journal of Systems and Software 33(1): 101-108 (1996) |
| 1995 |
| 7 | | Lucas Chi Kwong Hui,
Kwok-Yan Lam:
Analysis and Experimentation on List Update Algorithms.
COCOON 1995: 576-581 |
| 6 | EE | Kwok-Yan Lam:
Replay tolerance of authentication protocols.
Computer Communications 18(12): 988-992 (1995) |
| 5 | EE | Kwok-Yan Lam,
Lucas Chi Kwong Hui,
Siu Leung Chung:
Multivariate data analysis software for enhancing system security.
Journal of Systems and Software 31(3): 267-275 (1995) |
| 1993 |
| 4 | | Hermann Strack,
Kwok-Yan Lam:
Context-Dependent Access Control in Distributed Systems.
SEC 1993: 137-155 |
| 1992 |
| 3 | EE | Kwok-Yan Lam,
Dieter Gollmann:
Freshness Assurance of Authentication Protocols.
ESORICS 1992: 261-272 |
| 2 | EE | Kwok-Yan Lam,
Thomas Beth:
Timely Authentication in Distributed Systems.
ESORICS 1992: 293-303 |
| 1991 |
| 1 | | Kwok-Yan Lam:
An Implementation for Small Databases with High Availability.
Operating Systems Review 25(4): 77-87 (1991) |