2008 | ||
---|---|---|
80 | EE | Jinyang Shi, Zhiyang You, Ming Gu, Kwok-Yan Lam: Biomapping: Privacy trustworthy biometrics using noninvertible and discriminable constructions. ICPR 2008: 1-4 |
79 | EE | Hong-Wei Sun, Kwok-Yan Lam, Dieter Gollmann, Siu Leung Chung, Jian-Bin Li, Jia-Guang Sun: Efficient Fingercode Classification. IEICE Transactions 91-D(5): 1252-1260 (2008) |
2007 | ||
78 | EE | Haiyong Chen, Hongwei Sun, Kwok-Yan Lam: A fast and elastic fingerprint matching algorithm using minutiae-centered circular regions. SECURWARE 2007: 211-215 |
2006 | ||
77 | EE | Xibin Zhao, Kwok-Yan Lam, Guimin Luo, Siu Leung Chung, Ming Gu: Minimal Threshold Closure. ESORICS 2006: 145-155 |
76 | EE | Xiaoming Jin, Xinqiang Zuo, Kwok-Yan Lam, Jianmin Wang, Jia-Guang Sun: Efficient Discovery of Emerging Frequent Patterns in ArbitraryWindows on Data Streams. ICDE 2006: 113 |
75 | EE | Hong-Wei Sun, Kwok-Yan Lam, Ming Gu, Jia-Guang Sun: An Efficient Algorithm for Fingercode-Based Biometric Identification. OTM Workshops (1) 2006: 469-478 |
2005 | ||
74 | EE | Mo Chen, Jian-Tao Sun, Hua-Jun Zeng, Kwok-Yan Lam: A practical system of keyphrase extraction for web pages. CIKM 2005: 277-278 |
73 | EE | Guoliang Xie, Mingwei Xu, Kwok-Yan Lam, Qian Wu: The Impact of Mobility Modeling in Mobile IP Multicast Research. ICCNMC 2005: 295-304 |
72 | EE | Hong-Wei Sun, Kwok-Yan Lam, Siu Leung Chung, Ming Gu, Jia-Guang Sun: An Efficient Anomaly Detection Algorithm for Vector-Based Intrusion Detection Systems. ICCNMC 2005: 817-825 |
71 | EE | Bangyu Wu, Kwok-Yan Lam, Siu Leung Chung, Huaxiong Wang: Secure Construction of Virtual Organizations in Grid Computing Systems. WINE 2005: 959-968 |
70 | EE | Hongwei Sun, Kwok-Yan Lam, Siu Leung Chung, Wei-Ming Dong, Ming Gu, Jia-Guang Sun: Efficient vector quantization using genetic algorithm. Neural Computing and Applications 14(3): 203-211 (2005) |
2004 | ||
69 | Chi-Hung Chi, Kwok-Yan Lam: Content Computing, Advanced Workshop on Content Computing, AWCC 2004, ZhenJiang, JiangSu, China, November 15-17, 2004, Proceedings Springer 2004 | |
68 | EE | Xibin Zhao, Kwok-Yan Lam, Siu Leung Chung, Ming Gu, Jia-Guang Sun: Authorization Mechanisms for Virtual Organizations in Distributed Computing Systems. ACISP 2004: 414-426 |
67 | EE | Xing-Yun He, Kwok-Yan Lam, Siu Leung Chung, Chi-Hung Chi, Jia-Guang Sun: Real-Time Emulation of Intrusion Victim in HoneyFarm. AWCC 2004: 143-154 |
66 | EE | Jian-Ping Yong, Kwok-Yan Lam, Siu Leung Chung, Ming Gu, Jia-Guang Sun: Enhancing the Scalability of the Community Authorization Service for Virtual Organizations. AWCC 2004: 182-193 |
65 | EE | Hong-Wei Sun, Kwok-Yan Lam, Siu Leung Chung, Ming Gu, Jia-Guang Sun: Anomaly Detection in Grid Computing Based on Vector Quantization. GCC 2004: 883-886 |
64 | EE | Yi-Yuan Huang, Kwok-Yan Lam, Siu Leung Chung, Chi-Hung Chi, Jia-Guang Sun: Application of Content Computing in Honeyfarm. WISA 2004: 211-222 |
2003 | ||
63 | EE | Zhi Guo, Kwok-Yan Lam, Siu Leung Chung, Ming Gu, Jia-Guang Sun: Efficient Presentation of Multivariate Audit Data for Intrusion Detection of Web-Based Internet Services. ACNS 2003: 63-75 |
62 | EE | Qinghu Li, Jianmin Wang, Kwok-Yan Lam, Jia-Guang Sun: GridFS: A Web-Based Data Grid with P2P Concepts and Writable Replicas. ICADL 2003: 639-642 |
61 | EE | Tieyan Li, Huafei Zhu, Kwok-Yan Lam: A Novel Two-Level Trust Model for Grid. ICICS 2003: 214-225 |
60 | EE | Qinghu Li, Jianmin Wang, Kwok-Yan Lam, Jia-Guang Sun: GridFS: A Web-Based Data Grid for the Distributed Sharing of Educational Resource Files. ICWL 2003: 81-92 |
59 | EE | Kwok-Yan Lam, Xibin Zhao, Siu Leung Chung, Ming Gu, Jia-Guang Sun: Enhancing Grid Security Infrastructure to Support Mobile Computing Nodes. WISA 2003: 42-54 |
58 | EE | Kwok-Yan Lam, Siu Leung Chung, Ming Gu, Jia-Guang Sun: Lightweight security for mobile commerce transactions. Computer Communications 26(18): 2052-2060 (2003) |
57 | EE | Kwok-Yan Lam, Siu Leung Chung, Ming Gu, Jia-Guang Sun: Security middleware for enhancing interoperability of Public Key Infrastructure. Computers & Security 22(6): 535-546 (2003) |
56 | EE | Ning Cai, Kwok-Yan Lam: On identification secret sharing schemes. Inf. Comput. 184(2): 298-310 (2003) |
2002 | ||
55 | EE | Tieyan Li, Kwok-Yan Lam: An optimal location update and searching algorithm for tracking mobile agent. AAMAS 2002: 639-646 |
54 | EE | Tieyan Li, Kwok-Yan Lam: Detecting anomalous agents in mobile agent system: a preliminary approach. AAMAS 2002: 655-656 |
53 | EE | Chi-Hung Chi, Chen Ding, Kwok-Yan Lam: Context Query in Information Retrieval. ICTAI 2002: 101-106 |
52 | EE | Chi-Hung Chi, John Sim, Kwok-Yan Lam: Agent Warehouse: A New Paradigm for Mobile Agent Deployment. ICTAI 2002: 455-462 |
51 | EE | Chi-Hung Chi, Chen Ding, Kwok-Yan Lam: Study for Fusion of Different Sources to Determine Relevance. ICTAI 2002: 515-520 |
50 | EE | Tieyan Li, Wai-Meng Chew, Kwok-Yan Lam: Defending against Distributed Denial of Service Attacks Using Resistant Mobile Agent Architecture. IPDPS 2002 |
49 | EE | Chi-Hung Chi, Xiang Li, Kwok-Yan Lam: Understanding the Object Retrieval Dependence of Web Page Access. MASCOTS 2002: 413-420 |
2001 | ||
48 | Tieyan Li, Kwok-Yan Lam: A Secure Group Solution for Multi-Agent EC System. IPDPS 2001: 169 | |
47 | Kwok-Yan Lam, Francesco Sica: The Weight Distribution of C5(1, n). Des. Codes Cryptography 24(2): 181-191 (2001) | |
46 | EE | Dingfeng Ye, Zongduo Dai, Kwok-Yan Lam: Decomposing Attacks on Asymmetric Cryptography Based on Mapping Compositions. J. Cryptology 14(2): 137-150 (2001) |
2000 | ||
45 | Huaxiong Wang, Kwok-Yan Lam, Guozhen Xiao, Huanhui Zhao: On Multiplicative Secret Sharing Schemes. ACISP 2000: 342-351 | |
44 | EE | Arrianto Mukti Wibowo, Kwok-Yan Lam, Gary S. H. Tan: Loyalty Program Scheme for Anonymous Payment System. EC-Web 2000: 253-265 |
43 | EE | Tieyan Li, Chuk-Yang Seng, Kwok-Yan Lam: A Secure Route Structure for Information Gathering Agent. PRIMA 2000: 101-114 |
42 | EE | Cunsheng Ding, Tor Helleseth, Kwok-Yan Lam: Duadic sequences of prime lengths. Discrete Mathematics 218(1-3): 33-49 (2000) |
41 | Chaoping Xing, Huaxiong Wang, Kwok-Yan Lam: Constructions of authentication codes from algebraic curves over finite fields. IEEE Transactions on Information Theory 46(3): 886-892 (2000) | |
40 | Guozhen Xiao, Shimin Wei, Kwok-Yan Lam, Kyoki Imamura: A fast algorithm for determining the linear complexity of a sequence with period pn over GF(q). IEEE Transactions on Information Theory 46(6): 2203-2206 (2000) | |
1999 | ||
39 | Kwok-Yan Lam, Eiji Okamoto, Chaoping Xing: Advances in Cryptology - ASIACRYPT '99, International Conference on the Theory and Applications of Cryptology and Information Security, Singapore, November 14-18, 1999, Proceedings Springer 1999 | |
38 | Chaoping Xing, Kwok-Yan Lam, Zhenghong Wei: A Class of Explicit Perfect Multi-sequences. ASIACRYPT 1999: 299-305 | |
37 | EE | Xiao Feng Wang, Kwok-Yan Lam, Xun Yi, C. Q. Zhang, Eiji Okamoto: Secure Agent-Mediated Auctionlike Negotiation Protocol for Internet Retail Commerce. CIA 1999: 291-302 |
36 | EE | Dingfeng Ye, Kwok-Yan Lam, Zong-Duo Dai: Cryptanalysis of ``2 R'' Schemes. CRYPTO 1999: 315-325 |
35 | Reihaneh Safavi-Naini, Huaxiong Wang, Kwok-Yan Lam: A New Approach to Robust Threshold RSA Signature Schemes. ICISC 1999: 184-196 | |
34 | EE | Sufatrio, Kwok-Yan Lam: Mobile IP Registration Protocol: A Security Attack and New Secure Minimal Public-Key Based Authentication. ISPAN 1999: 364-369 |
33 | EE | Sufatrio, Kwok-Yan Lam: Internet Mobility Support Optimized for Client Access and its Scalable Authentication Framework. MDA 1999: 220-229 |
32 | EE | Jianying Zhou, Kwok-Yan Lam: A Secure Pay-per View Scheme for Web-Based Video Service. Public Key Cryptography 1999: 315-326 |
31 | EE | Harald Niederreiter, Chaoping Xing, Kwok-Yan Lam: A New Construction of Algebraic Geometry Codes. Appl. Algebra Eng. Commun. Comput. 9(5): 373-381 (1999) |
30 | EE | Jianying Zhou, Kwok-Yan Lam: Securing digital signatures for non-repudiation. Computer Communications 22(8): 710-716 (1999) |
29 | Cunsheng Ding, Kwok-Yan Lam, Chaoping Xing: Construction and Enumeration of All Binary Duadic Codes of Length pm. Fundam. Inform. 38(1-2): 149-161 (1999) | |
28 | Chaoping Xing, Harald Niederreiter, Kwok-Yan Lam: Constructions of Algebraic-Geometry Codes. IEEE Transactions on Information Theory 45(4): 1186-1193 (1999) | |
27 | Chaoping Xing, Kwok-Yan Lam: Sequences with Almost Perfect Linear Complexity Profiles and Curves Over Finite Fields. IEEE Transactions on Information Theory 45(4): 1267-1270 (1999) | |
26 | Chaoping Xing, Harald Niederreiter, Kwok-Yan Lam: A generalization of algebraic-geometry codes. IEEE Transactions on Information Theory 45(7): 2498-2501 (1999) | |
25 | Cunsheng Ding, Tor Helleseth, Kwok-Yan Lam: Several classes of binary sequences with three-level autocorrelation. IEEE Transactions on Information Theory 45(7): 2606-2612 (1999) | |
24 | EE | Chunru Zhang, Kwok-Yan Lam, Sushil Jajodia: Scalable Threshold Closure. Theor. Comput. Sci. 226(1-2): 185-206 (1999) |
1998 | ||
23 | EE | Xun Yi, Kwok-Yan Lam, Yongfei Han: Differential Cryptanalysis of a Block Cipher. ACISP 1998: 58-67 |
22 | EE | Zong-Duo Dai, Dingfeng Ye, Kwok-Yan Lam: Weak Invertibiity of Finite Automata and Cryptanalysis on FAPKC. ASIACRYPT 1998: 227-241 |
21 | Guopei Qiao, Kwok-Yan Lam: RSA Signature Algorithm for Microcontroller Implementation. CARDIS 1998: 353-356 | |
20 | Xiao Feng Wang, Xun Yi, Kwok-Yan Lam, Eiji Okamoto: Secure Information Gathering Agent for Internet Trading. DAI 1998: 183-193 | |
19 | EE | Jianying Zhou, Kwok-Yan Lam: Undeniable Billing in Mobile Communication. MOBICOM 1998: 284-290 |
18 | EE | Xiao Feng Wang, Kwok-Yan Lam, Xun Yi: Secure Agent-Mediated Mobile Payment. PRIMA 1998: 162-173 |
17 | Xun Yi, Xiao Feng Wang, Kwok-Yan Lam, Eiji Okamoto, D. Frank Hsu: A Security Auction-Like Negotiation Protocol for Agent-Based Internet Trading. SRDS 1998: 197-203 | |
16 | EE | Xun Yi, Xiao Feng Wang, Kwok-Yan Lam: A Secure Intelligent Trade Agent System. Trends in Distributed Systems for Electronic Commerce 1998: 218-228 |
1997 | ||
15 | Xun Yi, Kwok-Yan Lam: A New Hash Function Based on Block Cipher. ACISP 1997: 139-146 | |
14 | Xun Yi, Kwok-Yan Lam, Shi Xin Cheng, Xiao Hu You: A New Byte-Oriented Block Cipher. ISW 1997: 209-220 | |
13 | Lucas Chi Kwong Hui, Kwok-Yan Lam, Chee Weng Chea: Global Optimisation in Neural Network Training. Neural Computing and Applications 5(1): 58-64 (1997) | |
1996 | ||
12 | EE | Rynson W. H. Lau, Kwok-Yan Lam, Siu Leung Chung: The Failure of Anti-Hacking Legislation: A Hong Kong Perspective. ACM Conference on Computer and Communications Security 1996: 62-67 |
11 | Kwok-Yan Lam, San Ling, Lucas Chi Kwong Hui: Efficient Generation of Elliptic Curve Cryptosystems. COCOON 1996: 411-416 | |
10 | EE | Kwok-Yan Lam, Lucas Chi Kwong Hui: Efficient nearer-ancestor algorithm for network routing. Computer Communications 19(12): 1014-1019 (1996) |
9 | EE | Kwok-Yan Lam, Lucas Chi Kwong Hui: Designing a system infrastructure for distributed programs. Computer Communications 19(9-10): 754-762 (1996) |
8 | EE | Kwok-Yan Lam, Lucas Chi Kwong Hui, Siu Leung Chung: A data reduction method for intrusion detection. Journal of Systems and Software 33(1): 101-108 (1996) |
1995 | ||
7 | Lucas Chi Kwong Hui, Kwok-Yan Lam: Analysis and Experimentation on List Update Algorithms. COCOON 1995: 576-581 | |
6 | EE | Kwok-Yan Lam: Replay tolerance of authentication protocols. Computer Communications 18(12): 988-992 (1995) |
5 | EE | Kwok-Yan Lam, Lucas Chi Kwong Hui, Siu Leung Chung: Multivariate data analysis software for enhancing system security. Journal of Systems and Software 31(3): 267-275 (1995) |
1993 | ||
4 | Hermann Strack, Kwok-Yan Lam: Context-Dependent Access Control in Distributed Systems. SEC 1993: 137-155 | |
1992 | ||
3 | EE | Kwok-Yan Lam, Dieter Gollmann: Freshness Assurance of Authentication Protocols. ESORICS 1992: 261-272 |
2 | EE | Kwok-Yan Lam, Thomas Beth: Timely Authentication in Distributed Systems. ESORICS 1992: 293-303 |
1991 | ||
1 | Kwok-Yan Lam: An Implementation for Small Databases with High Availability. Operating Systems Review 25(4): 77-87 (1991) |