Lucas C. K. Hui

According to our database1, Lucas C. K. Hui authored at least 149 papers between 1992 and 2018.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepage:

On csauthors.net:

Bibliography

2018
A Dynamic Trust Framework for Opportunistic Mobile Social Networks.
IEEE Trans. Network and Service Management, 2018

File Fragment Classification Using Grayscale Image Conversion and Deep Learning in Digital Forensics.
Proceedings of the 2018 IEEE Security and Privacy Workshops, 2018

DCN: Detector-Corrector Network Against Evasion Attacks on Deep Neural Networks.
Proceedings of the 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2018

2017
F-DDIA: A Framework for Detecting Data Injection Attacks in Nonlinear Cyber-Physical Systems.
Security and Communication Networks, 2017

A survey on cyber attacks against nonlinear state estimation in power systems of ubiquitous cities.
Pervasive and Mobile Computing, 2017

A Traceable Outsourcing CP-ABE Scheme with Attribute Revocation.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

Crypt-EHRServer: Protecting Confidentiality with Attribute-Based Encryption and Encrypted Query Processing.
Proceedings of the 14th International Symposium on Pervasive Systems, 2017

Analyzing Selfish Behavior in Opportunistic Networks.
Proceedings of the 14th International Symposium on Pervasive Systems, 2017

Detecting Time Synchronization Attacks in Cyber-Physical Systems with Machine Learning Techniques.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

2016
A Survey on Regular Expression Matching for Deep Packet Inspection: Applications, Algorithms, and Hardware Platforms.
IEEE Communications Surveys and Tutorials, 2016

A Survey on the Cyber Attacks Against Non-linear State Estimation in Smart Grids.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

2015
PRGA: Privacy-Preserving Recording & Gateway-Assisted Authentication of Power Usage Information for Smart Grid.
IEEE Trans. Dependable Sec. Comput., 2015

WeChecker: efficient and precise detection of privilege escalation vulnerabilities in Android apps.
Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2015

Early car collision prediction in VANET.
Proceedings of the International Conference on Connected Vehicles and Expo, 2015

Data Framing Attacks against Nonlinear State Estimation in Smart Grid.
Proceedings of the 2015 IEEE Globecom Workshops, San Diego, CA, USA, December 6-10, 2015, 2015

2014
VSPN: VANET-Based Secure and Privacy-Preserving Navigation.
IEEE Trans. Computers, 2014

UFLE: a user-friendly location-free encryption system for mobile users.
Security and Communication Networks, 2014

Improved key integrity checking for high-speed quantum key distribution using combinatorial group testing with strongly selective family design.
Quantum Information Processing, 2014

Modeling the initial stage of a file sharing process on a BitTorrent network.
Peer-to-Peer Networking and Applications, 2014

Assessing cryptographic signature schemes from a legal perspective.
Proceedings of the 2014 Twelfth Annual International Conference on Privacy, 2014

Distributing blackbox data to multiple vehicles in a secure and privacy-preserving manner.
Proceedings of the International Conference on Connected Vehicles and Expo, 2014

CoChecker: Detecting Capability and Sensitive Data Leaks from Component Chains in Android.
Proceedings of the Information Security and Privacy - 19th Australasian Conference, 2014

2013
Maintaining Hard Disk Integrity With Digital Legal Professional Privilege (LPP) Data.
IEEE Trans. Information Forensics and Security, 2013

Heap Graph Based Software Theft Detection.
IEEE Trans. Information Forensics and Security, 2013

Unknown Chinese word extraction based on variety of overlapping strings.
Inf. Process. Manage., 2013

VANET-based secure taxi service.
Ad Hoc Networks, 2013

Photo Forensics on Shanzhai Mobile Phone.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2013

Towards a Better Similarity Measure for Keyword Profiling via Clustering.
Proceedings of the IEEE 37th Annual Computer Software and Applications Conference, 2013

2012
SPCS: Secure and Privacy-Preserving Charging-Station Searching using VANET.
J. Information Security, 2012

Efficient HMAC-based secure communication for VANETs.
Computer Networks, 2012

Privacy-preserving advance power reservation.
IEEE Communications Magazine, 2012

MLAS: Multiple level authentication scheme for VANETs.
Ad Hoc Networks, 2012

DroidChecker: analyzing android applications for capability leak.
Proceedings of the Fifth ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2012

Non-Transferable Proxy Re-Encryption Scheme.
Proceedings of the 5th International Conference on New Technologies, 2012

Forensic Analysis of Pirated Chinese Shanzhai Mobile Phones.
Proceedings of the Advances in Digital Forensics VIII, 2012

Selling Power Back to the Grid in a Secure and Privacy-Preserving Manner.
Proceedings of the Information and Communications Security - 14th International Conference, 2012

PE(AR)2: Privacy-Enhanced Anonymous Authentication with Reputation and Revocation.
Proceedings of the Computer Security - ESORICS 2012, 2012

Cloud based Privacy Preserving Data Mining with Decision Tree.
Proceedings of the DATA 2012, 2012

SPICE - Simple Privacy-Preserving Identity-Management for Cloud Environment.
Proceedings of the Applied Cryptography and Network Security, 2012

Fully Leakage-Resilient Signatures with Auxiliary Inputs.
Proceedings of the Information Security and Privacy - 17th Australasian Conference, 2012

2011
OPQ: OT-Based Private Querying in VANETs.
IEEE Trans. Intelligent Transportation Systems, 2011

k-Dimensional hashing scheme for hard disk integrity verification in computer forensics.
Journal of Zhejiang University - Science C, 2011

SPECS: Secure and privacy enhancing communications schemes for VANETs.
Ad Hoc Networks, 2011

PASS: Privacy-preserving authentication scheme for smart grid network.
Proceedings of the IEEE Second International Conference on Smart Grid Communications, 2011

A Dual Cube Hashing Scheme for Solving LPP Integrity Problem.
Proceedings of the 2011 IEEE Sixth International Workshop on Systematic Approaches to Digital Forensic Engineering, 2011

Sockpuppet Detection in Online Discussion Forums.
Proceedings of the Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2011

Automatic Online Monitoring and Data-Mining Internet Forums.
Proceedings of the Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2011

Privacy Preserving Confidential Forensic Investigation for Shared or Remote Servers.
Proceedings of the Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2011

Credential-Based Privacy-Preserving Power Request Scheme for Smart Grid Network.
Proceedings of the Global Communications Conference, 2011

JSBiRTH: Dynamic JavaScript Birthmark Based on the Run-Time Heap.
Proceedings of the 35th Annual IEEE International Computer Software and Applications Conference, 2011

Dynamic Software Birthmark for Java Based on Heap Memory Analysis.
Proceedings of the Communications and Multimedia Security, 2011

MLAS: multiple level authentication scheme for VANETs.
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011

2010
New Differential Cryptanalytic Results for Reduced-Round CAST-128.
IEICE Transactions, 2010

Non-Transferable Proxy Re-Encryption Scheme for Data Dissemination Control.
IACR Cryptology ePrint Archive, 2010

A new key establishment scheme for wireless sensor networks
CoRR, 2010

Differential-algebraic cryptanalysis of reduced-round of Serpent-256.
SCIENCE CHINA Information Sciences, 2010

Forensic Analysis of Popular Chinese Internet Applications.
Proceedings of the Advances in Digital Forensics VI, 2010

Identifying Volatile Data from Multiple Memory Dumps in Live Forensics.
Proceedings of the Advances in Digital Forensics VI, 2010

Security Issues and Challenges for Cyber Physical System.
Proceedings of the 2010 IEEE/ACM Int'l Conference on Green Computing and Communications, 2010

2009
Secure Chained Threshold Proxy Signature without and with Supervision.
JSEA, 2009

ARMR: Anonymous routing protocol with multiple routes for communications in mobile ad hoc networks.
Ad Hoc Networks, 2009

Two Efficient Proxy Signature Schemes for Delegation Chains with Nonrepudiation and Untraceability.
Proceedings of the 2009 International Conference on Security & Management, 2009

A New Practical Scheme for Protecting Web Content.
Proceedings of the 2009 International Conference on Security & Management, 2009

A Practical SMS-based Mutual Authentication Protocol for Secure Online Banking.
Proceedings of the 2009 International Conference on Security & Management, 2009

RFID Forward Secure Authentication Protocol: Flaw and Solution.
Proceedings of the 2009 International Conference on Complex, 2009

SPECS: Secure and Privacy Enhancing Communications Schemes for VANETs.
Proceedings of the Ad Hoc Networks, First International Conference, 2009

2008
Multiplicative Forward-Secure Threshold Signature Scheme.
I. J. Network Security, 2008

Protecting Digital Legal Professional Privilege (LPP) Data.
Proceedings of the Third International Workshop on Systematic Approaches to Digital Forensic Engineering, 2008

Strongly Anonymous Communications in Mobile Ad Hoc Networks.
Proceedings of the Seventh International Network Conference (INC 2008), 2008

Improving Disk Sector Integrity Using K-Dimension Hashing.
Proceedings of the Advances in Digital Forensics IV, 2008

Chained Threshold Proxy Signature without and with Supervision.
Proceedings of the International Conference on Computer Science and Software Engineering, 2008

Authenticated Directed Diffusion.
Proceedings of the Cryptology and Network Security, 7th International Conference, 2008

2007
Delegation with supervision.
Inf. Sci., 2007

An Attack on Libert et al.' s ID-based Undeniable Signature Scheme.
I. J. Network Security, 2007

Accountability in organisations.
IJICS, 2007

Providing distributed certificate authority service in cluster-based mobile ad hoc networks.
Computer Communications, 2007

Dynamic Distributed Certificate Authority Services for Mobile Ad Hoc Networks.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2007

A Hybrid Approach for Authenticating MPEG-2 Streaming Data.
Proceedings of the Multimedia Content Analysis and Mining, International Workshop, 2007

Tools and Technology for Computer Forensics: Research and Development in Hong Kong (Invited Paper).
Proceedings of the Information Security Practice and Experience, 2007

An Efficient Cluster-Based Proactive Secret Share Update Scheme for Mobile Ad Hoc Networks.
Proceedings of IEEE International Conference on Communications, 2007

Improving Disk Sector Integrity Using 3-dimension Hashing Scheme.
Proceedings of the Future Generation Communication and Networking, 2007

Remote Group User Authentication with Forward Secrecy and Key Agreement with Smartcard.
Proceedings of the 2007 International Conference on Security & Management, 2007

2006
Intrusion Detection Routers: Design, Implementation and Evaluation Using an Experimental Testbed.
IEEE Journal on Selected Areas in Communications, 2006

Towards a Secure Copyright Protection Infrastructure for e-Education Material: Principles Learned from Experience.
I. J. Network Security, 2006

Practical electronic lotteries with offline TTP.
Computer Communications, 2006

A Key-Recovery System for Long-term Encrypted Documents.
Proceedings of the Tenth IEEE International Enterprise Distributed Object Computing Conference (EDOC 2006), 2006

An Efficient Bloom Filter Based Solution for Multiparty Private Matching.
Proceedings of the 2006 International Conference on Security & Management, 2006

2005
A generic anti-spyware solution by access control list at kernel level.
Journal of Systems and Software, 2005

Forward-secure multisignature and blind signature schemes.
Applied Mathematics and Computation, 2005

An improved authenticated key agreement protocol with perfect forward secrecy for wireless mobile communication.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2005

Providing Distributed Certificate Authority Service in Mobile Ad Hoc Networks.
Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks, 2005

Signcryption in Hierarchical Identity Based Cryptosystem.
Proceedings of the Security and Privacy in the Age of Ubiquitous Computing, IFIP TC11 20th International Conference on Information Security (SEC 2005), May 30, 2005

Digital Evidence Search Kit.
Proceedings of the First International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE 2005), 2005

Identity Based Delegation Network.
Proceedings of the Progress in Cryptology, 2005

Efficient Authorization in Delegation Chains with Strong Non-Repudiation.
Proceedings of the Applied Public Key Infrastructure, 2005

Separable and Anonymous Identity-Based Key Issuing.
Proceedings of the 11th International Conference on Parallel and Distributed Systems, 2005

Supporting Efficient Authorization in Delegation with Supervision.
Proceedings of the 11th International Conference on Parallel and Distributed Systems, 2005

An e-Lottery Scheme Using Verifiable Random Function.
Proceedings of the Computational Science and Its Applications, 2005

Secure Role Activation and Authorization in the Enterprise Environment.
Proceedings of the Public Key Infrastructure, 2005

Identity Based Ring Signature: Why, How and What Next.
Proceedings of the Public Key Infrastructure, 2005

Trustworthy Browsing - A Secure Web Accessing Model.
Proceedings of the 2005 IEEE International Conference on e-Technology, e-Commerce, and e-Services (EEE 2005), 29 March, 2005

Dynamic Integrity Verification for Software Self-defense.
Proceedings of The 2005 International Conference on Security and Management, 2005

A model to support fine-grained delegation of authorization.
Proceedings of The 2005 International Conference on Security and Management, 2005

Efficient Identity Based Ring Signature.
Proceedings of the Applied Cryptography and Network Security, 2005

Role Activation Management in Role Based Access Control.
Proceedings of the Information Security and Privacy, 10th Australasian Conference, 2005

Two Improved Partially Blind Signature Schemes from Bilinear Pairings.
Proceedings of the Information Security and Privacy, 10th Australasian Conference, 2005

Performance evaluation on CRL distribution using flooding in mobile ad hoc networks (MANETs).
Proceedings of the 43nd Annual Southeast Regional Conference, 2005

2004
Separable and Anonymous Identity-Based Key Issuing.
IACR Cryptology ePrint Archive, 2004

Signcryption in Hierarchical Identity Based Cryptosystem.
IACR Cryptology ePrint Archive, 2004

Efficient Identity Based Ring Signature.
IACR Cryptology ePrint Archive, 2004

Two Improved Partially Blind Signature Schemes from Bilinear Pairings.
IACR Cryptology ePrint Archive, 2004

Identity Based Threshold Ring Signature.
IACR Cryptology ePrint Archive, 2004

IDR: An Intrusion Detection Router for Defending against Distributed Denial-of-Service (DDoS) Attacks.
Proceedings of the 7th International Symposium on Parallel Architectures, 2004

Applying Forward Security and Threshold Cryptography in Ad Hoc Networks.
Proceedings of the International Conference on Wireless Networks, 2004

Identity Based Threshold Ring Signature.
Proceedings of the Information Security and Cryptology, 2004

Secure Hierarchical Identity Based Signature and Its Application.
Proceedings of the Information and Communications Security, 6th International Conference, 2004

The Delegation Problem and Practical PKI-Based Solutions.
Proceedings of the ICEIS 2004, 2004

A model for delegation of accountability.
Proceedings of the IASTED International Conference on Software Engineering, 2004

Delegation of signing and decryption rights using pki proxy memo.
Proceedings of the IASTED International Conference on Software Engineering, 2004

Risk Management of Corporate Confidential Information in Digital Form.
Proceedings of the 28th International Computer Software and Applications Conference (COMPSAC 2004), 2004

Tuning the Collision Test for Power.
Proceedings of the Computer Science 2004, 2004

2003
SmartTutor: An intelligent tutoring system in web-based adult education.
Journal of Systems and Software, 2003

eCX: a secure infrastructure for e-course delivery.
Internet Research, 2003

Content Engineering Agent: A TBL-Based E-Course Development Tool with TQM.
IJDET, 2003

A Secure Modified ID-Based Undeniable Signature Scheme.
IACR Cryptology ePrint Archive, 2003

Efficient Forward and Provably Secure ID-Based Signcryption Scheme with Public Verifiability and Public Ciphertext Authenticity.
Proceedings of the Information Security and Cryptology, 2003

2001
Handling signature purposes in workflow systems.
Journal of Systems and Software, 2001

Security of Wang et al.'s group-oriented (t, n) threshold signature schemes with traceable signers.
Inf. Process. Lett., 2001

2000
Security of Tseng-Jan's group signature schemes.
Inf. Process. Lett., 2000

Secure and Practical Tree-Structure Signature Schemes Based on Discrete Logarithms.
Proceedings of the Public Key Cryptography, 2000

Multiple Signature Handling in Workflow Systems.
Proceedings of the 33rd Annual Hawaii International Conference on System Sciences (HICSS-33), 2000

Modeling Web Navigation by Statechart.
Proceedings of the 24th International Computer Software and Applications Conference (COMPSAC 2000), 2000

1999
Integrating Different Signature Purposes in Workflow Systems - A Case Study.
Proceedings of the Internet Applications, 5th International Computer Science Conference, 1999

Signature Management in Workflow Systems.
Proceedings of the 23rd International Computer Software and Applications Conference (COMPSAC '99), 1999

1997
Global Optimisation in Neural Network Training.
Neural Computing and Applications, 1997

1996
A data reduction method for intrusion detection.
Journal of Systems and Software, 1996

Analyzing Self-Adjusting Linear List Algorithms with Deletions and Unsuccessful Searches.
Inf. Process. Lett., 1996

Efficient nearer-ancestor algorithm for network routing.
Computer Communications, 1996

Designing a system infrastructure for distributed programs.
Computer Communications, 1996

Randomized Competitive Algorithms for Successful and Unsuccessful Search.
Comput. J., 1996

Efficient Generation of Elliptic Curve Cryptosystems.
Proceedings of the Computing and Combinatorics, Second Annual International Conference, 1996

1995
Use of a quasi-Newton method in a feedforward neural network construction algorithm.
IEEE Trans. Neural Networks, 1995

Multivariate data analysis software for enhancing system security.
Journal of Systems and Software, 1995

Analysis and Experimentation on List Update Algorithms.
Proceedings of the Computing and Combinatorics, First Annual International Conference, 1995

1994
Analysing Deletions in Competitive Self-Adjusting Linear List.
Proceedings of the Algorithms and Computation, 5th International Symposium, 1994

1993
Unsuccessful Search in Self-Adjusting Data Structures.
J. Algorithms, 1993

Randomized Competitive Algorithms for Successful and Unsuccessful Search on Self-adjusting Linear Lists.
Proceedings of the Algorithms and Computation, 4th International Symposium, 1993

1992
On Efficient Unsuccessful Search.
Proceedings of the Third Annual ACM/SIGACT-SIAM Symposium on Discrete Algorithms, 1992

Color Set Size Problem with Application to String Matching.
Proceedings of the Combinatorial Pattern Matching, Third Annual Symposium, 1992


  Loading...