H. W. Chan

According to our database1, H. W. Chan authored at least 22 papers between 1985 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Intrinsic Properties of Human Accelerometer Data for Machine Learning.
Proceedings of the IEEE Statistical Signal Processing Workshop, 2023

2022
Improving Rehabilitative Assessment with Statistical and Shape Preserving Surrogate Data and Singular Spectrum Analysis.
Proceedings of the Signal Processing: Algorithms, 2022

2020
Surrogate Data for Deep Learning Architectures in Rehabilitative Edge Systems.
Proceedings of the Signal Processing: Algorithms, 2020

2009
MIX-Crowds, an Anonymity Scheme for File Retrieval Systems.
Proceedings of the INFOCOM 2009. 28th IEEE International Conference on Computer Communications, 2009

2007
An Attack on Libert et al.' s ID-based Undeniable Signature Scheme.
Int. J. Netw. Secur., 2007

A Hybrid Approach for Authenticating MPEG-2 Streaming Data.
Proceedings of the Multimedia Content Analysis and Mining, International Workshop, 2007

2006
Performance Modeling of Level Switching in Multitier Mobile Communication Systems.
IEEE Trans. Mob. Comput., 2006

Intrusion Detection Routers: Design, Implementation and Evaluation Using an Experimental Testbed.
IEEE J. Sel. Areas Commun., 2006

2005
Enhanced Distance-Based Location Management of Mobile Communication Systems Using a Cell Coordinates Approach.
IEEE Trans. Mob. Comput., 2005

An improved authenticated key agreement protocol with perfect forward secrecy for wireless mobile communication.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2005

Digital Evidence Search Kit.
Proceedings of the First International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE 2005), 2005

2004
Separable and Anonymous Identity-Based Key Issuing.
IACR Cryptol. ePrint Arch., 2004

IDR: An Intrusion Detection Router for Defending against Distributed Denial-of-Service (DDoS) Attacks.
Proceedings of the 7th International Symposium on Parallel Architectures, 2004

Delegation of signing and decryption rights using pki proxy memo.
Proceedings of the IASTED International Conference on Software Engineering, 2004

Risk Management of Corporate Confidential Information in Digital Form.
Proceedings of the 28th International Computer Software and Applications Conference (COMPSAC 2004), 2004

2001
Security of Wang et al.'s group-oriented (t, n) threshold signature schemes with traceable signers.
Inf. Process. Lett., 2001

2000
Security of Tseng-Jan's group signature schemes.
Inf. Process. Lett., 2000

Secure and Practical Tree-Structure Signature Schemes Based on Discrete Logarithms.
Proceedings of the Public Key Cryptography, 2000

1997
Visualizing input and output analysis for simulation (VINOAS).
Simul. Pract. Theory, 1997

1992
Simulation of flow control schemes- backpressure and window control.
Simul., 1992

1985
A note on Jury's stability test and Kalman-Bertram's Liapunov function.
Proc. IEEE, 1985

Window selection in flow controlled networks.
Proceedings of the Ninth Symposium on Data Communications, 1985


  Loading...