C. F. Chong

According to our database1, C. F. Chong authored at least 16 papers between 1967 and 2008.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2008
Protecting Digital Legal Professional Privilege (LPP) Data.
Proceedings of the Third International Workshop on Systematic Approaches to Digital Forensic Engineering, 2008

2007
An Attack on Libert et al.' s ID-based Undeniable Signature Scheme.
Int. J. Netw. Secur., 2007

A Hybrid Approach for Authenticating MPEG-2 Streaming Data.
Proceedings of the Multimedia Content Analysis and Mining, International Workshop, 2007

2006
Intrusion Detection Routers: Design, Implementation and Evaluation Using an Experimental Testbed.
IEEE J. Sel. Areas Commun., 2006

An Efficient Bloom Filter Based Solution for Multiparty Private Matching.
Proceedings of the 2006 International Conference on Security & Management, 2006

2005
An improved authenticated key agreement protocol with perfect forward secrecy for wireless mobile communication.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2005

Digital Evidence Search Kit.
Proceedings of the First International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE 2005), 2005

2004
Separable and Anonymous Identity-Based Key Issuing.
IACR Cryptol. ePrint Arch., 2004

IDR: An Intrusion Detection Router for Defending against Distributed Denial-of-Service (DDoS) Attacks.
Proceedings of the 7th International Symposium on Parallel Architectures, 2004

Delegation of signing and decryption rights using pki proxy memo.
Proceedings of the IASTED International Conference on Software Engineering, 2004

Risk Management of Corporate Confidential Information in Digital Form.
Proceedings of the 28th International Computer Software and Applications Conference (COMPSAC 2004), 2004

Tuning the Collision Test for Power.
Proceedings of the Computer Science 2004, 2004

2001
Security of Wang et al.'s group-oriented (t, n) threshold signature schemes with traceable signers.
Inf. Process. Lett., 2001

2000
Security of Tseng-Jan's group signature schemes.
Inf. Process. Lett., 2000

Secure and Practical Tree-Structure Signature Schemes Based on Discrete Logarithms.
Proceedings of the Public Key Cryptography, 2000

1967
Engineering design of a mass random access plated wire memory.
Proceedings of the American Federation of Information Processing Societies: Proceedings of the AFIPS '67 Fall Joint Computer Conference, 1967


  Loading...