Recent Publications:
  1. C.F. Chong and S.P. Lam, Splitting Central Extensions of Rn by Rm, Southeast Asian Bulletin of Mathematics (1997) 4: 349-352
  2. C.F. Chong, K.P. Chow and T.W. Lam, Very Fast Telephone Directory Search using Large Memory Resident Data Structures, Proc. of the IASTED Conf. on Software Engineering, Las Vegas, October 1998, pp. 94-98
  3. L.C.K. Hui, K.P. Chow, W.W. Tsang, C.F. Chong, H.W. Chan, V. Chan, K.M. Chan, M. Lee, D. Hung, C.T. Hung, P. Hong, P. Yeung, Strong Cryptogranphic Library - Implementation and Applications, Proceedings of The 9th Hong Kong Computer Society Data Base Conference, May 1999
  4. X.Y. Wang, L.C. Hui, K.P. Chow, W.W. Tsang, C.F. Chong, and H.W. Chan, Secure and Practical Tree-Structured Signature Schemes Based on Discrete Logarithms, Proceedings of The International Workshop on Practice and Theory in Public Key Cryptography, Melbourne, January 2000, pp. 167-177
  5. Z.C. Li, L.C.K. Hui, K.P. Chow, C.F. Chong, W.W. Tsang, and H.W. Chan, Cryptanalysis of Harn Digital Multisignature Scheme with Distinguished Signing Authorities, Electronic Letters (2000) 36: 314-315
  6. Z.C. Li, L.C.K. Hui, K.P. Chow, C.F. Chong, W.W. Tsang, and H.W. Chan, Security of Tseng-Jan's Group Signature Scheme, Information Processing Letters (2000) 75: 187-189
  7. L.C.K. Hui, K.P. Chow, W.W. Tsang, H.W. Chan, C.F. Chong, What an Investigator Needs to Know about Encryption & Tracking Technologies (invited paper), First Asia CryberCrime Summit, April 25-26, 2001
  8. Z.C. Li, L.C.K. Hui, K.P. Chow, C.F. Chong, W.W. Tsang and H.W. Chan, Security of Wang et al.'s Group-Oriented Threshold Signature Schemes with Traceable Signers, Information Processing Letters (2001) 80: 295-298
  9. L.C.K. Hui, K.P. Chow, K.H. Pun, W.W. Tsang, H.W. Chan, C.F. Chong, Design of a Cyber Forensic Tool (invited paper), Proceedings of The Transnational Organized Crime Conference 2002, March 2002
  10. L. Hui, K.P. Chow, K.H. Pun, W.W. Tsang, C.F. Chong, H.W. Chan, Cyber Forensics, Company Secretary (2002) 12:7 43-47
  11. L.C.K. Hui, X. Wang, K.P. Chow, W.W. Tsang, C.F. Chong, H.W. Chan, The Differential Analysis of Reduced Skipjack Variants from The First Round, Proceedings of The ChinaCrypt2002 Conference, Shandong, August 2002, pp. 77-87
  12. K.H. Pun, L. Hui, K.P. Chow, W.W. Tsang, C.F. Chong, H.W. Chan, Review of The Electronic Transaction Ordinance: Can The Personal Identification Number Replace The Digital Signature? Hong Kong Law Journal (2002) 32:2 241-257
  13. K.H. Pun, Gary Ip, C.F. Chong, Vivien Chan, K.P. Chow, Lucas Hui, W.W. Tsang, H.W. Chan, Processing Legal Documents in the Chinese-Speaking World: the Experience of HKLII, Fifth Conference of Law via the Internet, Sydney, November 2003
  14. W.W. Tsang, L.C.K. Hui, K.P. Chow, C.F. Chong, and C.W. Tso, Tuning the collision test for power, Conferences in Research and Practice in Information Series (Proceedings of the 27th Australasian Computer Science Conference), (2004) 26:1, 23-30
  15. Venus L.S. Cheung, Lucas C.K. Hui, S.M. Yiu, K.P. Chow, K.H. Pun, W.W. Tsang, H.W. Chan, C.F. Chong, Delegation of Signing and Decryption Rights using PKI Proxy Memo, Proceedings of the IASTED International Conference in Software Engineering, Innsbruck, February 2004, 281-285
  16. Eric Y.K. Chan, H.W. Chan, K.M. Chan, Vivien P.S. Chan, Samuel T. Chanson, Matthew M.H. Cheung, C.F. Chong, K.P. Chow, Albert K.T. Hui, Lucas C.K. Hui, Luke C.K. Lam, W.C. Lau, Kevin K.H. Pun, Anthony Y.F. Tsang, W.W. Tsang, Sam C.W. Tso, Dit-Yan Yeung, K.Y. Yu, IDR: An Intrusion Detection Router for Defending against Distributed Denial-of-Service (DDoS) Attacks, Proceedings of the Seventh International Symposium on Parallel Architectures, Algorithms and Networks, Hong Kong SAR, May 2004, 581-586
  17. L.C.K. Hui, Kevin K.H. Pun, Venus L.S. Cheung, K.P. Chow, W.W. Tsang, H.W. Chan, C.F. Chong, Processing Legal Documents in the Chinese-speaking World: HKLII's Experience, UTS Law Review, (August 2004), 6:
  18. Lucas Hui, K.P Chow, K.H. Pun, S.M. Yiu, W.W. Tsang, C.F. Chong, and H.W. Chan, Pisk Management of Corporate Confidential Information in Digital Form, Proceedings of the Twenty-Eighth Annual International Computer Software and Application Conference (COMPSAC 2004), Hong Kong SAR, September 2004, 88-89
  19. K.H. Pun, Eric Chan, K.P. Chow, C.F. Chong, Jasmine Ma, Lucas Hui, W.W. Tsang, and H.W. Chan, Cross-Referencing for Bilingual Electronic Legal Documents in HKLII, The Sixth Conference on Computerisation of Law via The Internet, Paris, France, November 2004
  20. K.H. Pun, Venus L.S. Cheung, Lucas C.K. Hui, K.P. Chow, W.W. Tsang, H.W. Chan, and C.F. Chong, Computer Crimes: What Everyone Should Know about Them, in Cyber-Crime: The Challenge in Asia, Roderic Broadhurst and Peter Grabosky (Eds.), HKU Press, 2005, 197-206
  21. Ai-Fen Sui, Lucas C.K. Hui, S.M. Yiu, K.P. Chow, W.W. Tsang, C.F. Chong, K.H. Pun, and H.W. Chan, An Improved Authenticated Key Agreement Protocol with Perfect Forward Secrecy for Wireless Mobile Communication, Proceedings of The IEEE Wireless Communications and Networking Conference (WCNC 2005), New Orleans, March 2005
  22. Ai-Fen Sui, S.S.M. Chow, L.C.K. Hui, S.M. Yiu, K.P. Chow, W.W. Tsang, C.F. Chong, K.H. Pun, and H.W. Chan, Separable and Anonymous Identity-Based Key Issuing, Proceedings of The First International Workshop on Security in Networks and Distributed Systems (SNDS 2005), Fukuoka, Japan, July 20-22, 2005.
  23. K.P. Chow, C.F. Chong, K.Y. Lai, L.C.K. Hui, K.H. Pun, W.W. Tsang, and H.W. Chan, Digital Evidence Search Kit, Proceedings og The First International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE 2005), Taipei, Taiwan, November 7-10, 2005.

Last updated : 7 October 2005