Kwok-Yan Lam

According to our database1, Kwok-Yan Lam authored at least 129 papers between 1991 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of two.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Spectrum pricing for cognitive radio networks with user's stochastic distribution.
Wireless Networks, 2019

Improving Spectrum Management for Satellite Communication Systems With Hunger Marketing.
IEEE Wireless Commun. Letters, 2019

Efficient threshold password-authenticated secret sharing protocols for cloud computing.
J. Parallel Distrib. Comput., 2019

BitVis: An Interactive Visualization System for Bitcoin Accounts Analysis.
Proceedings of the Crypto Valley Conference on Blockchain Technology, 2019

A New Blind ECDSA Scheme for Bitcoin Transaction Anonymity.
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019

2018
Power allocation in cognitive radio networks over Rayleigh-fading channels with hybrid intelligent algorithms.
Wireless Networks, 2018

Caching Efficiency Enhancement at Wireless Edges with Concerns on User's Quality of Experience.
Wireless Communications and Mobile Computing, 2018

Joint Pricing and Power Allocation for Multibeam Satellite Systems With Dynamic Game Model.
IEEE Trans. Vehicular Technology, 2018

Dynamic Spectrum Access Networks With Heterogeneous Users: How to Price the Spectrum?
IEEE Trans. Vehicular Technology, 2018

Spectrum Trading for Satellite Communication Systems With Dynamic Bargaining.
IEEE Trans. Communications, 2018

Secure and Lightweight Compressive Sensing Using Stream Cipher.
IEEE Trans. on Circuits and Systems, 2018

Wireless Communication and Security Issues for Cyber-Physical Systems and the Internet-of-Things.
Proceedings of the IEEE, 2018

Q-Learning-Based Dynamic Spectrum Access in Cognitive Industrial Internet of Things.
MONET, 2018

A New Blind ECDSA Scheme for Bitcoin Transaction Anonymity.
IACR Cryptology ePrint Archive, 2018

Behavior-Interior-Aware User Preference Analysis Based on Social Networks.
Complexity, 2018

Spectrum Optimization for Cognitive Satellite Communications With Cournot Game Model.
IEEE Access, 2018

Spectrum Allocation With Asymmetric Monopoly Model for Multibeam-Based Cognitive Satellite Networks.
IEEE Access, 2018

Privacy Preserving User Based Web Service Recommendations.
IEEE Access, 2018

A Blockchain Framework for Insurance Processes.
Proceedings of the 9th IFIP International Conference on New Technologies, 2018

BLIC: A Blockchain Protocol for Manufacturing and Supply Chain Management of ICS.
Proceedings of the IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2018

Efficient and Lightweight Quantized Compressive Sensing using μ-Law.
Proceedings of the IEEE International Symposium on Circuits and Systems, 2018

A Comparative Study of Transactional and Semantic Approaches for Predicting Cascades on Twitter.
Proceedings of the Twenty-Seventh International Joint Conference on Artificial Intelligence, 2018

Using Blockchain to Control Access to Cloud Data.
Proceedings of the Information Security and Cryptology - 14th International Conference, 2018

From the Perspective of CNN to Adversarial Iris Images.
Proceedings of the 9th IEEE International Conference on Biometrics Theory, 2018

CoLPUF : A Novel Configurable LFSR-based PUF.
Proceedings of the 2018 IEEE Asia Pacific Conference on Circuits and Systems, 2018

2017
Survey of secure processors.
Proceedings of the 2017 International Conference on Embedded Computer Systems: Architectures, 2017

Security of autonomous vehicle as a cyber-physical system.
Proceedings of the 7th International Symposium on Embedded Computing and System Design, 2017

2016
Identity in the Internet-of-Things (IoT): New Challenges and Opportunities.
Proceedings of the Information and Communications Security - 18th International Conference, 2016

2012
Obtaining more Karatsuba-like formulae over the binary field.
IET Information Security, 2012

2011
Energy-Efficient Key Distribution Using Electrocardiograph Biometric Set for Secure Communications in Wireless Body Healthcare Networks.
J. Medical Systems, 2011

2010
BodySec: synchronized key distribution using biometric slots for wireless body sensor networks.
Mobile Computing and Communications Review, 2010

Trust Based Routing for Misbehavior Detection in Ad Hoc Networks.
JNW, 2010

Overlap-free Karatsuba-Ofman polynomial multiplication algorithms.
IET Information Security, 2010

Ubiquitous and Secure Certificate Service for Wireless Ad Hoc Network.
IEICE Transactions, 2010

Selection Policy of Rescue Servers Based on Workload Characterization of Flash Crowd.
Proceedings of the Sixth International Conference on Semantics Knowledge and Grid, 2010

2009
A robust certification service for highly dynamic MANET in emergency tasks.
Int. J. Communication Systems, 2009

Obtaining More Karatsuba-Like Formulae over The Binary Field.
IACR Cryptology ePrint Archive, 2009

MinuCode: A Fixed-Value Representation of Fingerprint Minutiae for Biometric Cryptosystem.
Proceedings of the Advances in Information Security and Assurance, 2009

Self-initialized Distributed Certificate Authority for Mobile Ad Hoc Network.
Proceedings of the Advances in Information Security and Assurance, 2009

Reusable Set Constructions Using Randomized Dissolvent Templates for Biometric Security.
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009

SAODV: A MANET Routing Protocol that can Withstand Black Hole Attack.
Proceedings of the 2009 International Conference on Computational Intelligence and Security, 2009

Towards Energy-Efficient Secure Communications Using Biometric Key Distribution in Wireless Biomedical Healthcare Networks.
Proceedings of the 2nd International Conference on BioMedical Engineering and Informatics, 2009

2008
Efficient Fingercode Classification.
IEICE Transactions, 2008

Robust Remote Authentication for Scalable Web-Based Services.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008

Biomapping: Privacy trustworthy biometrics using noninvertible and discriminable constructions.
Proceedings of the 19th International Conference on Pattern Recognition (ICPR 2008), 2008

Ubiquitous and Secure Certificate Service for Mobile Ad Hoc Network.
Proceedings of the 2008 IEEE/IPIP International Conference on Embedded and Ubiquitous Computing (EUC 2008), 2008

2007
Overlap-free Karatsuba-Ofman Polynomial Multiplication Algorithms.
IACR Cryptology ePrint Archive, 2007

A fast and elastic fingerprint matching algorithm using minutiae-centered circular regions.
Proceedings of the First International Conference on Emerging Security Information, 2007

Dynamically Constructing Mixed Pyramid for Fast VQ Encoding.
Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), 2007

2006
An Efficient Algorithm for Fingercode-Based Biometric Identification.
Proceedings of the On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops, 2006

Efficient Discovery of Emerging Frequent Patterns in ArbitraryWindows on Data Streams.
Proceedings of the 22nd International Conference on Data Engineering, 2006

Minimal Threshold Closure.
Proceedings of the Computer Security, 2006

2005
Efficient vector quantization using genetic algorithm.
Neural Computing and Applications, 2005

An ID-based multisignature scheme without reblocking and predetermined signing order.
Computer Standards & Interfaces, 2005

Secure Construction of Virtual Organizations in Grid Computing Systems.
Proceedings of the Internet and Network Economics, First International Workshop, 2005

The Impact of Mobility Modeling in Mobile IP Multicast Research.
Proceedings of the Networking and Mobile Computing, Third International Conference, 2005

An Efficient Anomaly Detection Algorithm for Vector-Based Intrusion Detection Systems.
Proceedings of the Networking and Mobile Computing, Third International Conference, 2005

A practical system of keyphrase extraction for web pages.
Proceedings of the 2005 ACM CIKM International Conference on Information and Knowledge Management, Bremen, Germany, October 31, 2005

2004
Application of Content Computing in Honeyfarm.
Proceedings of the Information Security Applications, 5th International Workshop, 2004

Anomaly Detection in Grid Computing Based on Vector Quantization.
Proceedings of the Grid and Cooperative Computing, 2004

Enhancing the Scalability of the Community Authorization Service for Virtual Organizations.
Proceedings of the Content Computing, Advanced Workshop on Content Computing, 2004

Real-Time Emulation of Intrusion Victim in HoneyFarm.
Proceedings of the Content Computing, Advanced Workshop on Content Computing, 2004

Authorization Mechanisms for Virtual Organizations in Distributed Computing Systems.
Proceedings of the Information Security and Privacy: 9th Australasian Conference, 2004

2003
On identification secret sharing schemes.
Inf. Comput., 2003

Security middleware for enhancing interoperability of Public Key Infrastructure.
Computers & Security, 2003

Lightweight security for mobile commerce transactions.
Computer Communications, 2003

Enhancing Grid Security Infrastructure to Support Mobile Computing Nodes.
Proceedings of the Information Security Applications, 4th International Workshop, 2003

GridFS: A Web-Based Data Grid for the Distributed Sharing of Educational Resource Files.
Proceedings of the Advances in Web-Based Learning, 2003

A Novel Two-Level Trust Model for Grid.
Proceedings of the Information and Communications Security, 5th International Conference, 2003

GridFS: A Web-Based Data Grid with P2P Concepts and Writable Replicas.
Proceedings of the Digital Libraries: Technology and Management of Indigenous Knowledge for Global Access, 2003

Efficient Presentation of Multivariate Audit Data for Intrusion Detection of Web-Based Internet Services.
Proceedings of the Applied Cryptography and Network Security, 2003

2002
Understanding the Object Retrieval Dependence of Web Page Access.
Proceedings of the 10th International Workshop on Modeling, 2002

Defending against Distributed Denial of Service Attacks Using Resistant Mobile Agent Architecture.
Proceedings of the 16th International Parallel and Distributed Processing Symposium (IPDPS 2002), 2002

Agent Warehouse: A New Paradigm for Mobile Agent Deployment.
Proceedings of the 14th IEEE International Conference on Tools with Artificial Intelligence (ICTAI 2002), 2002

Study for Fusion of Different Sources to Determine Relevance.
Proceedings of the 14th IEEE International Conference on Tools with Artificial Intelligence (ICTAI 2002), 2002

Context Query in Information Retrieval.
Proceedings of the 14th IEEE International Conference on Tools with Artificial Intelligence (ICTAI 2002), 2002

Detecting anomalous agents in mobile agent system: a preliminary approach.
Proceedings of the First International Joint Conference on Autonomous Agents & Multiagent Systems, 2002

An optimal location update and searching algorithm for tracking mobile agent.
Proceedings of the First International Joint Conference on Autonomous Agents & Multiagent Systems, 2002

2001
Decomposing Attacks on Asymmetric Cryptography Based on Mapping Compositions.
J. Cryptology, 2001

The Weight Distribution of C5(1, n).
Des. Codes Cryptogr., 2001

A Secure Group Solution for Multi-Agent EC System.
Proceedings of the 15th International Parallel & Distributed Processing Symposium (IPDPS-01), 2001

2000
Constructions of authentication codes from algebraic curves over finite fields.
IEEE Trans. Information Theory, 2000

A fast algorithm for determining the linear complexity of a sequence with period pn over GF(q).
IEEE Trans. Information Theory, 2000

Duadic sequences of prime lengths.
Discrete Mathematics, 2000

A Secure Route Structure for Information Gathering Agent.
Proceedings of the Design and Applications of Intelligent Agents, 2000

Loyalty Program Scheme for Anonymous Payment System.
Proceedings of the Electronic Commerce and Web Technologies, 2000

On Multiplicative Secret Sharing Schemes.
Proceedings of the Information Security and Privacy, 5th Australasian Conference, 2000

1999
A generalization of algebraic-geometry codes.
IEEE Trans. Information Theory, 1999

Constructions of Algebraic-Geometry Codes.
IEEE Trans. Information Theory, 1999

Sequences with Almost Perfect Linear Complexity Profiles and Curves Over Finite Fields.
IEEE Trans. Information Theory, 1999

Several classes of binary sequences with three-level autocorrelation.
IEEE Trans. Information Theory, 1999

Scalable Threshold Closure.
Theor. Comput. Sci., 1999

Construction and Enumeration of All Binary Duadic Codes of Length pm.
Fundam. Inform., 1999

Securing digital signatures for non-repudiation.
Computer Communications, 1999

A New Construction of Algebraic Geometry Codes.
Appl. Algebra Eng. Commun. Comput., 1999

Agent-based copyright protection architecture for online electronic publishing.
Proceedings of the Security and Watermarking of Multimedia Contents, 1999

A Secure Pay-per View Scheme for Web-Based Video Service.
Proceedings of the Public Key Cryptography, 1999

Internet Mobility Support Optimized for Client Access and its Scalable Authentication Framework.
Proceedings of the Mobile Data Access, First International Conference, 1999

Mobile IP Registration Protocol: A Security Attack and New Secure Minimal Public-Key Based Authentication.
Proceedings of the 1999 International Symposium on Parallel Architectures, 1999

A New Approach to Robust Threshold RSA Signature Schemes.
Proceedings of the Information Security and Cryptology, 1999

Cryptanalysis of "2 R" Schemes.
Proceedings of the Advances in Cryptology, 1999

Secure Agent-Mediated Auctionlike Negotiation Protocol for Internet Retail Commerce.
Proceedings of the Cooperative Information Agents III, Third International Workshop, 1999

A Class of Explicit Perfect Multi-sequences.
Proceedings of the Advances in Cryptology, 1999

1998
An optimized protocol for mobile network authentication and security.
Mobile Computing and Communications Review, 1998

On the efficient implementation of fair non-repudiation.
Computer Communication Review, 1998

A Security Auction-Like Negotiation Protocol for Agent-Based Internet Trading.
Proceedings of the Seventeenth Symposium on Reliable Distributed Systems, 1998

Secure Agent-Mediated Mobile Payment.
Proceedings of the Multiagent Platforms, 1998

Undeniable Billing in Mobile Communication.
Proceedings of the MOBICOM '98, 1998

A Secure Intelligent Trade Agent System.
Proceedings of the Trends in Distributed Systems for Electronic Commerce, 1998

Secure Information Gathering Agent for Internet Trading.
Proceedings of the Multi-Agent Systems: Theories, 1998

RSA Signature Algorithm for Microcontroller Implementation.
Proceedings of the Smart Card Research and Applications, This International Conference, 1998

Weak Invertibiity of Finite Automata and Cryptanalysis on FAPKC.
Proceedings of the Advances in Cryptology, 1998

Differential Cryptanalysis of a Block Cipher.
Proceedings of the Information Security and Privacy, Third Australasian Conference, 1998

1997
Global Optimisation in Neural Network Training.
Neural Computing and Applications, 1997

A New Byte-Oriented Block Cipher.
Proceedings of the Information Security, First International Workshop, 1997

A New Hash Function Based on Block Cipher.
Proceedings of the Information Security and Privacy, Second Australasian Conference, 1997

1996
A data reduction method for intrusion detection.
Journal of Systems and Software, 1996

Efficient nearer-ancestor algorithm for network routing.
Computer Communications, 1996

Designing a system infrastructure for distributed programs.
Computer Communications, 1996

Efficient Generation of Elliptic Curve Cryptosystems.
Proceedings of the Computing and Combinatorics, Second Annual International Conference, 1996

The Failure of Anti-Hacking Legislation: A Hong Kong Perspective.
Proceedings of the CCS '96, 1996

1995
Multivariate data analysis software for enhancing system security.
Journal of Systems and Software, 1995

Replay tolerance of authentication protocols.
Computer Communications, 1995

Analysis and Experimentation on List Update Algorithms.
Proceedings of the Computing and Combinatorics, First Annual International Conference, 1995

1993
Context-Dependent Access Control in Distributed Systems.
Proceedings of the Computer Security, 1993

1992
Freshness Assurance of Authentication Protocols.
Proceedings of the Computer Security, 1992

Timely Authentication in Distributed Systems.
Proceedings of the Computer Security, 1992

1991
A new approach for improving system availability.
PhD thesis, 1991

An Implementation for Small Databases with High Availability.
Operating Systems Review, 1991


  Loading...