C. F. Chong
According to our database1,
C. F. Chong
authored at least 16 papers
between 1967 and 2008.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2008
Proceedings of the Third International Workshop on Systematic Approaches to Digital Forensic Engineering, 2008
2007
Int. J. Netw. Secur., 2007
Proceedings of the Multimedia Content Analysis and Mining, International Workshop, 2007
2006
Intrusion Detection Routers: Design, Implementation and Evaluation Using an Experimental Testbed.
IEEE J. Sel. Areas Commun., 2006
An Efficient Bloom Filter Based Solution for Multiparty Private Matching.
Proceedings of the 2006 International Conference on Security & Management, 2006
2005
An improved authenticated key agreement protocol with perfect forward secrecy for wireless mobile communication.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2005
Proceedings of the First International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE 2005), 2005
2004
IDR: An Intrusion Detection Router for Defending against Distributed Denial-of-Service (DDoS) Attacks.
Proceedings of the 7th International Symposium on Parallel Architectures, 2004
Delegation of signing and decryption rights using pki proxy memo.
Proceedings of the IASTED International Conference on Software Engineering, 2004
Proceedings of the 28th International Computer Software and Applications Conference (COMPSAC 2004), 2004
2001
Security of Wang et al.'s group-oriented (t, n) threshold signature schemes with traceable signers.
Inf. Process. Lett., 2001
2000
Proceedings of the Public Key Cryptography, 2000
1967
Proceedings of the American Federation of Information Processing Societies: Proceedings of the AFIPS '67 Fall Joint Computer Conference, 1967