dblp.uni-trier.dewww.uni-trier.de

Kwok-Yan Lam

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2008
80EEJinyang Shi, Zhiyang You, Ming Gu, Kwok-Yan Lam: Biomapping: Privacy trustworthy biometrics using noninvertible and discriminable constructions. ICPR 2008: 1-4
79EEHong-Wei Sun, Kwok-Yan Lam, Dieter Gollmann, Siu Leung Chung, Jian-Bin Li, Jia-Guang Sun: Efficient Fingercode Classification. IEICE Transactions 91-D(5): 1252-1260 (2008)
2007
78EEHaiyong Chen, Hongwei Sun, Kwok-Yan Lam: A fast and elastic fingerprint matching algorithm using minutiae-centered circular regions. SECURWARE 2007: 211-215
2006
77EEXibin Zhao, Kwok-Yan Lam, Guimin Luo, Siu Leung Chung, Ming Gu: Minimal Threshold Closure. ESORICS 2006: 145-155
76EEXiaoming Jin, Xinqiang Zuo, Kwok-Yan Lam, Jianmin Wang, Jia-Guang Sun: Efficient Discovery of Emerging Frequent Patterns in ArbitraryWindows on Data Streams. ICDE 2006: 113
75EEHong-Wei Sun, Kwok-Yan Lam, Ming Gu, Jia-Guang Sun: An Efficient Algorithm for Fingercode-Based Biometric Identification. OTM Workshops (1) 2006: 469-478
2005
74EEMo Chen, Jian-Tao Sun, Hua-Jun Zeng, Kwok-Yan Lam: A practical system of keyphrase extraction for web pages. CIKM 2005: 277-278
73EEGuoliang Xie, Mingwei Xu, Kwok-Yan Lam, Qian Wu: The Impact of Mobility Modeling in Mobile IP Multicast Research. ICCNMC 2005: 295-304
72EEHong-Wei Sun, Kwok-Yan Lam, Siu Leung Chung, Ming Gu, Jia-Guang Sun: An Efficient Anomaly Detection Algorithm for Vector-Based Intrusion Detection Systems. ICCNMC 2005: 817-825
71EEBangyu Wu, Kwok-Yan Lam, Siu Leung Chung, Huaxiong Wang: Secure Construction of Virtual Organizations in Grid Computing Systems. WINE 2005: 959-968
70EEHongwei Sun, Kwok-Yan Lam, Siu Leung Chung, Wei-Ming Dong, Ming Gu, Jia-Guang Sun: Efficient vector quantization using genetic algorithm. Neural Computing and Applications 14(3): 203-211 (2005)
2004
69 Chi-Hung Chi, Kwok-Yan Lam: Content Computing, Advanced Workshop on Content Computing, AWCC 2004, ZhenJiang, JiangSu, China, November 15-17, 2004, Proceedings Springer 2004
68EEXibin Zhao, Kwok-Yan Lam, Siu Leung Chung, Ming Gu, Jia-Guang Sun: Authorization Mechanisms for Virtual Organizations in Distributed Computing Systems. ACISP 2004: 414-426
67EEXing-Yun He, Kwok-Yan Lam, Siu Leung Chung, Chi-Hung Chi, Jia-Guang Sun: Real-Time Emulation of Intrusion Victim in HoneyFarm. AWCC 2004: 143-154
66EEJian-Ping Yong, Kwok-Yan Lam, Siu Leung Chung, Ming Gu, Jia-Guang Sun: Enhancing the Scalability of the Community Authorization Service for Virtual Organizations. AWCC 2004: 182-193
65EEHong-Wei Sun, Kwok-Yan Lam, Siu Leung Chung, Ming Gu, Jia-Guang Sun: Anomaly Detection in Grid Computing Based on Vector Quantization. GCC 2004: 883-886
64EEYi-Yuan Huang, Kwok-Yan Lam, Siu Leung Chung, Chi-Hung Chi, Jia-Guang Sun: Application of Content Computing in Honeyfarm. WISA 2004: 211-222
2003
63EEZhi Guo, Kwok-Yan Lam, Siu Leung Chung, Ming Gu, Jia-Guang Sun: Efficient Presentation of Multivariate Audit Data for Intrusion Detection of Web-Based Internet Services. ACNS 2003: 63-75
62EEQinghu Li, Jianmin Wang, Kwok-Yan Lam, Jia-Guang Sun: GridFS: A Web-Based Data Grid with P2P Concepts and Writable Replicas. ICADL 2003: 639-642
61EETieyan Li, Huafei Zhu, Kwok-Yan Lam: A Novel Two-Level Trust Model for Grid. ICICS 2003: 214-225
60EEQinghu Li, Jianmin Wang, Kwok-Yan Lam, Jia-Guang Sun: GridFS: A Web-Based Data Grid for the Distributed Sharing of Educational Resource Files. ICWL 2003: 81-92
59EEKwok-Yan Lam, Xibin Zhao, Siu Leung Chung, Ming Gu, Jia-Guang Sun: Enhancing Grid Security Infrastructure to Support Mobile Computing Nodes. WISA 2003: 42-54
58EEKwok-Yan Lam, Siu Leung Chung, Ming Gu, Jia-Guang Sun: Lightweight security for mobile commerce transactions. Computer Communications 26(18): 2052-2060 (2003)
57EEKwok-Yan Lam, Siu Leung Chung, Ming Gu, Jia-Guang Sun: Security middleware for enhancing interoperability of Public Key Infrastructure. Computers & Security 22(6): 535-546 (2003)
56EENing Cai, Kwok-Yan Lam: On identification secret sharing schemes. Inf. Comput. 184(2): 298-310 (2003)
2002
55EETieyan Li, Kwok-Yan Lam: An optimal location update and searching algorithm for tracking mobile agent. AAMAS 2002: 639-646
54EETieyan Li, Kwok-Yan Lam: Detecting anomalous agents in mobile agent system: a preliminary approach. AAMAS 2002: 655-656
53EEChi-Hung Chi, Chen Ding, Kwok-Yan Lam: Context Query in Information Retrieval. ICTAI 2002: 101-106
52EEChi-Hung Chi, John Sim, Kwok-Yan Lam: Agent Warehouse: A New Paradigm for Mobile Agent Deployment. ICTAI 2002: 455-462
51EEChi-Hung Chi, Chen Ding, Kwok-Yan Lam: Study for Fusion of Different Sources to Determine Relevance. ICTAI 2002: 515-520
50EETieyan Li, Wai-Meng Chew, Kwok-Yan Lam: Defending against Distributed Denial of Service Attacks Using Resistant Mobile Agent Architecture. IPDPS 2002
49EEChi-Hung Chi, Xiang Li, Kwok-Yan Lam: Understanding the Object Retrieval Dependence of Web Page Access. MASCOTS 2002: 413-420
2001
48 Tieyan Li, Kwok-Yan Lam: A Secure Group Solution for Multi-Agent EC System. IPDPS 2001: 169
47 Kwok-Yan Lam, Francesco Sica: The Weight Distribution of C5(1, n). Des. Codes Cryptography 24(2): 181-191 (2001)
46EEDingfeng Ye, Zongduo Dai, Kwok-Yan Lam: Decomposing Attacks on Asymmetric Cryptography Based on Mapping Compositions. J. Cryptology 14(2): 137-150 (2001)
2000
45 Huaxiong Wang, Kwok-Yan Lam, Guozhen Xiao, Huanhui Zhao: On Multiplicative Secret Sharing Schemes. ACISP 2000: 342-351
44EEArrianto Mukti Wibowo, Kwok-Yan Lam, Gary S. H. Tan: Loyalty Program Scheme for Anonymous Payment System. EC-Web 2000: 253-265
43EETieyan Li, Chuk-Yang Seng, Kwok-Yan Lam: A Secure Route Structure for Information Gathering Agent. PRIMA 2000: 101-114
42EECunsheng Ding, Tor Helleseth, Kwok-Yan Lam: Duadic sequences of prime lengths. Discrete Mathematics 218(1-3): 33-49 (2000)
41 Chaoping Xing, Huaxiong Wang, Kwok-Yan Lam: Constructions of authentication codes from algebraic curves over finite fields. IEEE Transactions on Information Theory 46(3): 886-892 (2000)
40 Guozhen Xiao, Shimin Wei, Kwok-Yan Lam, Kyoki Imamura: A fast algorithm for determining the linear complexity of a sequence with period pn over GF(q). IEEE Transactions on Information Theory 46(6): 2203-2206 (2000)
1999
39 Kwok-Yan Lam, Eiji Okamoto, Chaoping Xing: Advances in Cryptology - ASIACRYPT '99, International Conference on the Theory and Applications of Cryptology and Information Security, Singapore, November 14-18, 1999, Proceedings Springer 1999
38 Chaoping Xing, Kwok-Yan Lam, Zhenghong Wei: A Class of Explicit Perfect Multi-sequences. ASIACRYPT 1999: 299-305
37EEXiao Feng Wang, Kwok-Yan Lam, Xun Yi, C. Q. Zhang, Eiji Okamoto: Secure Agent-Mediated Auctionlike Negotiation Protocol for Internet Retail Commerce. CIA 1999: 291-302
36EEDingfeng Ye, Kwok-Yan Lam, Zong-Duo Dai: Cryptanalysis of ``2 R'' Schemes. CRYPTO 1999: 315-325
35 Reihaneh Safavi-Naini, Huaxiong Wang, Kwok-Yan Lam: A New Approach to Robust Threshold RSA Signature Schemes. ICISC 1999: 184-196
34EE Sufatrio, Kwok-Yan Lam: Mobile IP Registration Protocol: A Security Attack and New Secure Minimal Public-Key Based Authentication. ISPAN 1999: 364-369
33EE Sufatrio, Kwok-Yan Lam: Internet Mobility Support Optimized for Client Access and its Scalable Authentication Framework. MDA 1999: 220-229
32EEJianying Zhou, Kwok-Yan Lam: A Secure Pay-per View Scheme for Web-Based Video Service. Public Key Cryptography 1999: 315-326
31EEHarald Niederreiter, Chaoping Xing, Kwok-Yan Lam: A New Construction of Algebraic Geometry Codes. Appl. Algebra Eng. Commun. Comput. 9(5): 373-381 (1999)
30EEJianying Zhou, Kwok-Yan Lam: Securing digital signatures for non-repudiation. Computer Communications 22(8): 710-716 (1999)
29 Cunsheng Ding, Kwok-Yan Lam, Chaoping Xing: Construction and Enumeration of All Binary Duadic Codes of Length pm. Fundam. Inform. 38(1-2): 149-161 (1999)
28 Chaoping Xing, Harald Niederreiter, Kwok-Yan Lam: Constructions of Algebraic-Geometry Codes. IEEE Transactions on Information Theory 45(4): 1186-1193 (1999)
27 Chaoping Xing, Kwok-Yan Lam: Sequences with Almost Perfect Linear Complexity Profiles and Curves Over Finite Fields. IEEE Transactions on Information Theory 45(4): 1267-1270 (1999)
26 Chaoping Xing, Harald Niederreiter, Kwok-Yan Lam: A generalization of algebraic-geometry codes. IEEE Transactions on Information Theory 45(7): 2498-2501 (1999)
25 Cunsheng Ding, Tor Helleseth, Kwok-Yan Lam: Several classes of binary sequences with three-level autocorrelation. IEEE Transactions on Information Theory 45(7): 2606-2612 (1999)
24EEChunru Zhang, Kwok-Yan Lam, Sushil Jajodia: Scalable Threshold Closure. Theor. Comput. Sci. 226(1-2): 185-206 (1999)
1998
23EEXun Yi, Kwok-Yan Lam, Yongfei Han: Differential Cryptanalysis of a Block Cipher. ACISP 1998: 58-67
22EEZong-Duo Dai, Dingfeng Ye, Kwok-Yan Lam: Weak Invertibiity of Finite Automata and Cryptanalysis on FAPKC. ASIACRYPT 1998: 227-241
21 Guopei Qiao, Kwok-Yan Lam: RSA Signature Algorithm for Microcontroller Implementation. CARDIS 1998: 353-356
20 Xiao Feng Wang, Xun Yi, Kwok-Yan Lam, Eiji Okamoto: Secure Information Gathering Agent for Internet Trading. DAI 1998: 183-193
19EEJianying Zhou, Kwok-Yan Lam: Undeniable Billing in Mobile Communication. MOBICOM 1998: 284-290
18EEXiao Feng Wang, Kwok-Yan Lam, Xun Yi: Secure Agent-Mediated Mobile Payment. PRIMA 1998: 162-173
17 Xun Yi, Xiao Feng Wang, Kwok-Yan Lam, Eiji Okamoto, D. Frank Hsu: A Security Auction-Like Negotiation Protocol for Agent-Based Internet Trading. SRDS 1998: 197-203
16EEXun Yi, Xiao Feng Wang, Kwok-Yan Lam: A Secure Intelligent Trade Agent System. Trends in Distributed Systems for Electronic Commerce 1998: 218-228
1997
15 Xun Yi, Kwok-Yan Lam: A New Hash Function Based on Block Cipher. ACISP 1997: 139-146
14 Xun Yi, Kwok-Yan Lam, Shi Xin Cheng, Xiao Hu You: A New Byte-Oriented Block Cipher. ISW 1997: 209-220
13 Lucas Chi Kwong Hui, Kwok-Yan Lam, Chee Weng Chea: Global Optimisation in Neural Network Training. Neural Computing and Applications 5(1): 58-64 (1997)
1996
12EERynson W. H. Lau, Kwok-Yan Lam, Siu Leung Chung: The Failure of Anti-Hacking Legislation: A Hong Kong Perspective. ACM Conference on Computer and Communications Security 1996: 62-67
11 Kwok-Yan Lam, San Ling, Lucas Chi Kwong Hui: Efficient Generation of Elliptic Curve Cryptosystems. COCOON 1996: 411-416
10EEKwok-Yan Lam, Lucas Chi Kwong Hui: Efficient nearer-ancestor algorithm for network routing. Computer Communications 19(12): 1014-1019 (1996)
9EEKwok-Yan Lam, Lucas Chi Kwong Hui: Designing a system infrastructure for distributed programs. Computer Communications 19(9-10): 754-762 (1996)
8EEKwok-Yan Lam, Lucas Chi Kwong Hui, Siu Leung Chung: A data reduction method for intrusion detection. Journal of Systems and Software 33(1): 101-108 (1996)
1995
7 Lucas Chi Kwong Hui, Kwok-Yan Lam: Analysis and Experimentation on List Update Algorithms. COCOON 1995: 576-581
6EEKwok-Yan Lam: Replay tolerance of authentication protocols. Computer Communications 18(12): 988-992 (1995)
5EEKwok-Yan Lam, Lucas Chi Kwong Hui, Siu Leung Chung: Multivariate data analysis software for enhancing system security. Journal of Systems and Software 31(3): 267-275 (1995)
1993
4 Hermann Strack, Kwok-Yan Lam: Context-Dependent Access Control in Distributed Systems. SEC 1993: 137-155
1992
3EEKwok-Yan Lam, Dieter Gollmann: Freshness Assurance of Authentication Protocols. ESORICS 1992: 261-272
2EEKwok-Yan Lam, Thomas Beth: Timely Authentication in Distributed Systems. ESORICS 1992: 293-303
1991
1 Kwok-Yan Lam: An Implementation for Small Databases with High Availability. Operating Systems Review 25(4): 77-87 (1991)

Coauthor Index

1Thomas Beth [2]
2Ning Cai [56]
3Chee Weng Chea [13]
4Haiyong Chen [78]
5Mo Chen [74]
6Shi Xin Cheng [14]
7Wai-Meng Chew [50]
8Chi-Hung Chi [49] [51] [52] [53] [64] [67] [69]
9Siu Leung Chung [5] [8] [12] [57] [58] [59] [63] [64] [65] [66] [67] [68] [70] [71] [72] [77] [79]
10Zongduo Dai (Zong-Duo Dai) [22] [36] [46]
11Chen Ding [51] [53]
12Cunsheng Ding [25] [29] [42]
13Wei-Ming Dong [70]
14Dieter Gollmann [3] [79]
15Ming Gu [57] [58] [59] [63] [65] [66] [68] [70] [72] [75] [77] [80]
16Zhi Guo [63]
17Yongfei Han [23]
18Xing-Yun He [67]
19Tor Helleseth [25] [42]
20D. Frank Hsu [17]
21Yi-Yuan Huang [64]
22Lucas Chi Kwong Hui [5] [7] [8] [9] [10] [11] [13]
23Kyoki Imamura [40]
24Sushil Jajodia [24]
25Xiaoming Jin [76]
26Rynson W. H. Lau [12]
27Jian-Bin Li [79]
28Qinghu Li [60] [62]
29Tieyan Li [43] [48] [50] [54] [55] [61]
30Xiang Li [49]
31San Ling [11]
32Guimin Luo [77]
33Harald Niederreiter [26] [28] [31]
34Eiji Okamoto [17] [20] [37] [39]
35Guopei Qiao [21]
36Reihaneh Safavi-Naini [35]
37Chuk-Yang Seng [43]
38Jinyang Shi [80]
39Francesco Sica [47]
40John Sim [52]
41Hermann Strack [4]
42 Sufatrio [33] [34]
43Hong-Wei Sun [65] [72] [75] [79]
44Hongwei Sun [70] [78]
45Jia-Guang Sun (Jiaguang Sun) [57] [58] [59] [60] [62] [63] [64] [65] [66] [67] [68] [70] [72] [75] [76] [79]
46Jian-Tao Sun [74]
47Gary S. H. Tan [44]
48Huaxiong Wang [35] [41] [45] [71]
49Jianmin Wang [60] [62] [76]
50Xiao Feng Wang [16] [17] [18] [20] [37]
51Shimin Wei [40]
52Zhenghong Wei [38]
53Arrianto Mukti Wibowo [44]
54Bangyu Wu [71]
55Qian Wu [73]
56Guozhen Xiao [40] [45]
57Guoliang Xie [73]
58Chaoping Xing [26] [27] [28] [29] [31] [38] [39] [41]
59Mingwei Xu [73]
60Dingfeng Ye [22] [36] [46]
61Xun Yi [14] [15] [16] [17] [18] [20] [23] [37]
62Jian-Ping Yong [66]
63Xiao Hu You [14]
64Zhiyang You [80]
65Hua-Jun Zeng [74]
66C. Q. Zhang [37]
67Chunru Zhang [24]
68Huanhui Zhao [45]
69Xibin Zhao [59] [68] [77]
70Jianying Zhou [19] [30] [32]
71Huafei Zhu [61]
72Xinqiang Zuo [76]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)