Recent Publications:
-
C.F. Chong and S.P. Lam,
Splitting Central Extensions of Rn by Rm,
Southeast Asian Bulletin of Mathematics (1997) 4: 349-352
-
C.F. Chong, K.P. Chow and T.W. Lam,
Very Fast Telephone Directory Search using Large Memory Resident
Data Structures,
Proc. of the IASTED Conf. on Software Engineering,
Las Vegas, October 1998, pp. 94-98
-
L.C.K. Hui, K.P. Chow, W.W. Tsang, C.F. Chong, H.W. Chan, V. Chan,
K.M. Chan, M. Lee, D. Hung, C.T. Hung, P. Hong, P. Yeung,
Strong Cryptogranphic Library - Implementation and Applications,
Proceedings of The 9th Hong Kong Computer Society Data Base Conference,
May 1999
-
X.Y. Wang, L.C. Hui, K.P. Chow, W.W. Tsang, C.F. Chong, and H.W. Chan,
Secure and Practical Tree-Structured Signature Schemes Based on Discrete
Logarithms,
Proceedings of The International Workshop on Practice and Theory in
Public Key Cryptography,
Melbourne, January 2000, pp. 167-177
-
Z.C. Li, L.C.K. Hui, K.P. Chow, C.F. Chong, W.W. Tsang, and H.W. Chan,
Cryptanalysis of Harn Digital Multisignature Scheme
with Distinguished Signing Authorities,
Electronic Letters (2000) 36: 314-315
-
Z.C. Li, L.C.K. Hui, K.P. Chow, C.F. Chong, W.W. Tsang, and H.W. Chan,
Security of Tseng-Jan's Group Signature Scheme,
Information Processing Letters (2000) 75: 187-189
-
L.C.K. Hui, K.P. Chow, W.W. Tsang, H.W. Chan, C.F. Chong,
What an Investigator Needs to Know about Encryption & Tracking
Technologies (invited paper),
First Asia CryberCrime Summit, April 25-26,
2001
-
Z.C. Li, L.C.K. Hui, K.P. Chow, C.F. Chong, W.W. Tsang and H.W. Chan,
Security of Wang et al.'s Group-Oriented Threshold Signature Schemes
with Traceable Signers,
Information Processing Letters (2001) 80: 295-298
-
L.C.K. Hui, K.P. Chow, K.H. Pun, W.W. Tsang, H.W. Chan, C.F. Chong,
Design of a Cyber Forensic Tool (invited paper),
Proceedings of The Transnational Organized Crime Conference 2002,
March 2002
-
L. Hui, K.P. Chow, K.H. Pun, W.W. Tsang, C.F. Chong, H.W. Chan,
Cyber Forensics,
Company Secretary (2002) 12:7 43-47
-
L.C.K. Hui, X. Wang, K.P. Chow, W.W. Tsang, C.F. Chong, H.W. Chan,
The Differential Analysis of Reduced Skipjack Variants from The First Round,
Proceedings of The ChinaCrypt2002 Conference, Shandong, August 2002,
pp. 77-87
-
K.H. Pun, L. Hui, K.P. Chow, W.W. Tsang, C.F. Chong, H.W. Chan,
Review of The Electronic Transaction Ordinance: Can The Personal Identification
Number Replace The Digital Signature?
Hong Kong Law Journal (2002) 32:2 241-257
-
K.H. Pun, Gary Ip, C.F. Chong, Vivien Chan, K.P. Chow,
Lucas Hui, W.W. Tsang, H.W. Chan,
Processing Legal Documents in the Chinese-Speaking World:
the Experience of HKLII,
Fifth Conference of Law via the Internet,
Sydney, November 2003
-
W.W. Tsang, L.C.K. Hui, K.P. Chow, C.F. Chong, and C.W. Tso,
Tuning the collision test for power,
Conferences in Research
and Practice in Information Series
(Proceedings of the 27th Australasian Computer Science Conference),
(2004) 26:1, 23-30
-
Venus L.S. Cheung, Lucas C.K. Hui, S.M. Yiu, K.P. Chow, K.H. Pun,
W.W. Tsang, H.W. Chan, C.F. Chong,
Delegation of Signing and Decryption Rights using PKI Proxy Memo,
Proceedings of the IASTED International Conference
in Software Engineering,
Innsbruck, February 2004, 281-285
-
Eric Y.K. Chan, H.W. Chan, K.M. Chan, Vivien P.S. Chan,
Samuel T. Chanson, Matthew M.H. Cheung, C.F. Chong, K.P. Chow,
Albert K.T. Hui, Lucas C.K. Hui, Luke C.K. Lam, W.C. Lau, Kevin K.H. Pun,
Anthony Y.F. Tsang, W.W. Tsang, Sam C.W. Tso, Dit-Yan Yeung, K.Y. Yu,
IDR: An Intrusion Detection Router for Defending against Distributed
Denial-of-Service (DDoS) Attacks,
Proceedings of the Seventh International Symposium on Parallel Architectures,
Algorithms and Networks,
Hong Kong SAR, May 2004, 581-586
-
L.C.K. Hui, Kevin K.H. Pun, Venus L.S. Cheung, K.P. Chow, W.W. Tsang,
H.W. Chan, C.F. Chong,
Processing Legal Documents in the Chinese-speaking World:
HKLII's Experience,
UTS Law Review,
(August 2004), 6:
-
Lucas Hui, K.P Chow, K.H. Pun, S.M. Yiu, W.W. Tsang, C.F. Chong,
and H.W. Chan,
Pisk Management of Corporate Confidential Information in Digital Form,
Proceedings of the Twenty-Eighth Annual International Computer Software
and Application Conference (COMPSAC 2004),
Hong Kong SAR, September 2004, 88-89
-
K.H. Pun, Eric Chan, K.P. Chow, C.F. Chong, Jasmine Ma, Lucas Hui,
W.W. Tsang, and H.W. Chan,
Cross-Referencing for Bilingual Electronic Legal Documents in HKLII,
The Sixth Conference on Computerisation of Law via The Internet,
Paris, France, November 2004
-
K.H. Pun, Venus L.S. Cheung, Lucas C.K. Hui, K.P. Chow, W.W. Tsang,
H.W. Chan, and C.F. Chong,
Computer Crimes: What Everyone Should Know about Them,
in Cyber-Crime: The Challenge in Asia, Roderic Broadhurst and Peter
Grabosky (Eds.), HKU Press, 2005, 197-206
-
Ai-Fen Sui, Lucas C.K. Hui, S.M. Yiu, K.P. Chow, W.W. Tsang, C.F. Chong,
K.H. Pun, and H.W. Chan,
An Improved Authenticated Key Agreement Protocol with Perfect Forward Secrecy
for Wireless Mobile Communication,
Proceedings of The IEEE Wireless Communications and Networking Conference
(WCNC 2005), New Orleans, March 2005
-
Ai-Fen Sui, S.S.M. Chow, L.C.K. Hui, S.M. Yiu, K.P. Chow, W.W. Tsang,
C.F. Chong, K.H. Pun, and H.W. Chan,
Separable and Anonymous Identity-Based Key Issuing,
Proceedings of The First International Workshop on Security in Networks
and Distributed Systems
(SNDS 2005), Fukuoka, Japan, July 20-22, 2005.
-
K.P. Chow, C.F. Chong, K.Y. Lai, L.C.K. Hui, K.H. Pun,
W.W. Tsang, and H.W. Chan,
Digital Evidence Search Kit,
Proceedings og The First International Workshop on Systematic Approaches
to Digital Forensic Engineering (SADFE 2005),
Taipei, Taiwan, November 7-10, 2005.
Last updated : 7 October 2005