Wai Wan Tsang

According to our database1, Wai Wan Tsang authored at least 24 papers between 1989 and 2007.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2007
An Attack on Libert et al.' s ID-based Undeniable Signature Scheme.
Int. J. Netw. Secur., 2007

A Hybrid Approach for Authenticating MPEG-2 Streaming Data.
Proceedings of the Multimedia Content Analysis and Mining, International Workshop, 2007

2006
Intrusion Detection Routers: Design, Implementation and Evaluation Using an Experimental Testbed.
IEEE J. Sel. Areas Commun., 2006

2005
Finding Motifs with Insufficient Number of Strong Binding Sites.
J. Comput. Biol., 2005

An improved authenticated key agreement protocol with perfect forward secrecy for wireless mobile communication.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2005

Digital Evidence Search Kit.
Proceedings of the First International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE 2005), 2005

Randomly Generating Triangulations of a Simple Polygon.
Proceedings of the Computing and Combinatorics, 11th Annual International Conference, 2005

2004
Separable and Anonymous Identity-Based Key Issuing.
IACR Cryptol. ePrint Arch., 2004

Finding motifs for insufficient number of sequences with strong binding to transcription facto.
Proceedings of the Eighth Annual International Conference on Computational Molecular Biology, 2004

IDR: An Intrusion Detection Router for Defending against Distributed Denial-of-Service (DDoS) Attacks.
Proceedings of the 7th International Symposium on Parallel Architectures, 2004

Automatic Template Matching Method for Tropical Cyclone Eye Fix.
Proceedings of the 17th International Conference on Pattern Recognition, 2004

Delegation of signing and decryption rights using pki proxy memo.
Proceedings of the IASTED International Conference on Software Engineering, 2004

Risk Management of Corporate Confidential Information in Digital Form.
Proceedings of the 28th International Computer Software and Applications Conference (COMPSAC 2004), 2004

Tuning the Collision Test for Power.
Proceedings of the Computer Science 2004, 2004

2001
Security of Wang et al.'s group-oriented (t, n) threshold signature schemes with traceable signers.
Inf. Process. Lett., 2001

2000
A simple method for generating gamma variables.
ACM Trans. Math. Softw., 2000

Security of Tseng-Jan's group signature schemes.
Inf. Process. Lett., 2000

Secure and Practical Tree-Structure Signature Schemes Based on Discrete Logarithms.
Proceedings of the Public Key Cryptography, 2000

1999
Efficiently Rendering Large Volume Data Using Texture Mapping Hardware.
Proceedings of the 1st Joint Eurographics, 1999

1998
The Monty Python method for generating random variables.
ACM Trans. Math. Softw., 1998

Probabilistic Segmentation of Volume Data for Visualization Using SOM-PNN Classifier.
Proceedings of the Proceeding of the 1998 IEEE Symposium on Volume Visualization, 1998

An Efficient Shadow Algorithm for Area Light Sources using BSP Trees.
Proceedings of the 6th Pacific Conference on Computer Graphics and Applications, 1998

1991
A Note on the comparison of five heuristic optimization techniques of a certain class of decision trees.
Inf. Sci., 1991

1989
An Optimal EREW Parallel Algorithm for Parenthesis Matching.
Proceedings of the International Conference on Parallel Processing, 1989


  Loading...