Lucas C. K. Hui
Affiliations:- University of Hong Kong, Department of Computer Science, Hong Kong
According to our database1,
Lucas C. K. Hui
authored at least 152 papers
between 1992 and 2021.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on csis.hku.hk
On csauthors.net:
Bibliography
2021
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2021
2020
A Light-Weight Crowdsourcing Aggregation in Privacy-Preserving Federated Learning System.
Proceedings of the 2020 International Joint Conference on Neural Networks, 2020
2019
IEEE Trans. Veh. Technol., 2019
2018
IEEE Trans. Netw. Serv. Manag., 2018
File Fragment Classification Using Grayscale Image Conversion and Deep Learning in Digital Forensics.
Proceedings of the 2018 IEEE Security and Privacy Workshops, 2018
Proceedings of the 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2018
2017
F-DDIA: A Framework for Detecting Data Injection Attacks in Nonlinear Cyber-Physical Systems.
Secur. Commun. Networks, 2017
A survey on cyber attacks against nonlinear state estimation in power systems of ubiquitous cities.
Pervasive Mob. Comput., 2017
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017
Crypt-EHRServer: Protecting Confidentiality with Attribute-Based Encryption and Encrypted Query Processing.
Proceedings of the 14th International Symposium on Pervasive Systems, 2017
Proceedings of the 14th International Symposium on Pervasive Systems, 2017
Proceedings of the Information Science and Applications 2017, 2017
Detecting Time Synchronization Attacks in Cyber-Physical Systems with Machine Learning Techniques.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017
Proceedings of the Mobile Security and Privacy, 2017
2016
A Survey on Regular Expression Matching for Deep Packet Inspection: Applications, Algorithms, and Hardware Platforms.
IEEE Commun. Surv. Tutorials, 2016
Proceedings of the Cloud Computing, Security, Privacy in New Computing Environments, 2016
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016
2015
PRGA: Privacy-Preserving Recording & Gateway-Assisted Authentication of Power Usage Information for Smart Grid.
IEEE Trans. Dependable Secur. Comput., 2015
WeChecker: efficient and precise detection of privilege escalation vulnerabilities in Android apps.
Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2015
Proceedings of the International Conference on Connected Vehicles and Expo, 2015
Proceedings of the 2015 IEEE Globecom Workshops, San Diego, CA, USA, December 6-10, 2015, 2015
2014
IEEE Trans. Computers, 2014
Secur. Commun. Networks, 2014
Improved key integrity checking for high-speed quantum key distribution using combinatorial group testing with strongly selective family design.
Quantum Inf. Process., 2014
Peer-to-Peer Netw. Appl., 2014
Proceedings of the 2014 Twelfth Annual International Conference on Privacy, 2014
Distributing blackbox data to multiple vehicles in a secure and privacy-preserving manner.
Proceedings of the International Conference on Connected Vehicles and Expo, 2014
CoChecker: Detecting Capability and Sensitive Data Leaks from Component Chains in Android.
Proceedings of the Information Security and Privacy - 19th Australasian Conference, 2014
2013
Maintaining Hard Disk Integrity With Digital Legal Professional Privilege (LPP) Data.
IEEE Trans. Inf. Forensics Secur., 2013
Inf. Process. Manag., 2013
Proceedings of the Wireless Algorithms, Systems, and Applications, 2013
Proceedings of the International Conference on Connected Vehicles and Expo, 2013
Proceedings of the IEEE 37th Annual Computer Software and Applications Conference, 2013
2012
J. Information Security, 2012
Proceedings of the Fifth ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2012
Proceedings of the 5th International Conference on New Technologies, 2012
Proceedings of the Advances in Digital Forensics VIII, 2012
Proceedings of the Information and Communications Security - 14th International Conference, 2012
Proceedings of the Computer Security - ESORICS 2012, 2012
Cloud based Privacy Preserving Data Mining with Decision Tree.
Proceedings of the DATA 2012, 2012
Proceedings of the Applied Cryptography and Network Security, 2012
Proceedings of the Information Security and Privacy - 17th Australasian Conference, 2012
2011
k-Dimensional hashing scheme for hard disk integrity verification in computer forensics.
J. Zhejiang Univ. Sci. C, 2011
Ad Hoc Networks, 2011
Proceedings of the IEEE Second International Conference on Smart Grid Communications, 2011
Proceedings of the 2011 IEEE Sixth International Workshop on Systematic Approaches to Digital Forensic Engineering, 2011
Proceedings of the Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2011
Proceedings of the Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2011
Proceedings of the Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2011
Proceedings of the Global Communications Conference, 2011
Proceedings of the 35th Annual IEEE International Computer Software and Applications Conference, 2011
Proceedings of the Communications and Multimedia Security, 2011
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011
2010
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2010
IACR Cryptol. ePrint Arch., 2010
Sci. China Inf. Sci., 2010
Proceedings of the Advances in Digital Forensics VI, 2010
Proceedings of the Advances in Digital Forensics VI, 2010
Proceedings of the 2010 IEEE/ACM Int'l Conference on Green Computing and Communications, 2010
2009
J. Softw. Eng. Appl., 2009
ARMR: Anonymous routing protocol with multiple routes for communications in mobile ad hoc networks.
Ad Hoc Networks, 2009
Two Efficient Proxy Signature Schemes for Delegation Chains with Nonrepudiation and Untraceability.
Proceedings of the 2009 International Conference on Security & Management, 2009
A New Practical Scheme for Protecting Web Content.
Proceedings of the 2009 International Conference on Security & Management, 2009
A Practical SMS-based Mutual Authentication Protocol for Secure Online Banking.
Proceedings of the 2009 International Conference on Security & Management, 2009
Proceedings of the 2009 International Conference on Complex, 2009
Proceedings of the Ad Hoc Networks, First International Conference, 2009
2008
Proceedings of the Third International Workshop on Systematic Approaches to Digital Forensic Engineering, 2008
Proceedings of the Seventh International Network Conference (INC 2008), 2008
Proceedings of the Advances in Digital Forensics IV, 2008
Proceedings of the International Conference on Computer Science and Software Engineering, 2008
Proceedings of the Cryptology and Network Security, 7th International Conference, 2008
2007
Int. J. Netw. Secur., 2007
Providing distributed certificate authority service in cluster-based mobile ad hoc networks.
Comput. Commun., 2007
Proceedings of the IEEE Wireless Communications and Networking Conference, 2007
Proceedings of the Multimedia Content Analysis and Mining, International Workshop, 2007
Tools and Technology for Computer Forensics: Research and Development in Hong Kong (Invited Paper).
Proceedings of the Information Security Practice and Experience, 2007
An Efficient Cluster-Based Proactive Secret Share Update Scheme for Mobile Ad Hoc Networks.
Proceedings of IEEE International Conference on Communications, 2007
Proceedings of the Future Generation Communication and Networking, 2007
Remote Group User Authentication with Forward Secrecy and Key Agreement with Smartcard.
Proceedings of the 2007 International Conference on Security & Management, 2007
2006
Intrusion Detection Routers: Design, Implementation and Evaluation Using an Experimental Testbed.
IEEE J. Sel. Areas Commun., 2006
Towards a Secure Copyright Protection Infrastructure for e-Education Material: Principles Learned from Experience.
Int. J. Netw. Secur., 2006
Proceedings of the Tenth IEEE International Enterprise Distributed Object Computing Conference (EDOC 2006), 2006
An Efficient Bloom Filter Based Solution for Multiparty Private Matching.
Proceedings of the 2006 International Conference on Security & Management, 2006
2005
J. Syst. Softw., 2005
An improved authenticated key agreement protocol with perfect forward secrecy for wireless mobile communication.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2005
Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks, 2005
Proceedings of the First International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE 2005), 2005
Proceedings of the Applied Public Key Infrastructure, 2005
Proceedings of the 11th International Conference on Parallel and Distributed Systems, 2005
Proceedings of the Computational Science and Its Applications, 2005
Proceedings of the Public Key Infrastructure, 2005
Proceedings of the Public Key Infrastructure, 2005
Proceedings of the 2005 IEEE International Conference on e-Technology, e-Commerce, and e-Services (EEE 2005), 29 March, 2005
Dynamic Integrity Verification for Software Self-defense.
Proceedings of The 2005 International Conference on Security and Management, 2005
A model to support fine-grained delegation of authorization.
Proceedings of The 2005 International Conference on Security and Management, 2005
Proceedings of the Information Security and Privacy, 10th Australasian Conference, 2005
Performance evaluation on CRL distribution using flooding in mobile ad hoc networks (MANETs).
Proceedings of the 43nd Annual Southeast Regional Conference, 2005
2004
IACR Cryptol. ePrint Arch., 2004
IACR Cryptol. ePrint Arch., 2004
IDR: An Intrusion Detection Router for Defending against Distributed Denial-of-Service (DDoS) Attacks.
Proceedings of the 7th International Symposium on Parallel Architectures, 2004
Applying Forward Security and Threshold Cryptography in Ad Hoc Networks.
Proceedings of the International Conference on Wireless Networks, 2004
Proceedings of the Information and Communications Security, 6th International Conference, 2004
The Delegation Problem and Practical PKI-Based Solutions.
Proceedings of the ICEIS 2004, 2004
A model for delegation of accountability.
Proceedings of the IASTED International Conference on Software Engineering, 2004
Delegation of signing and decryption rights using pki proxy memo.
Proceedings of the IASTED International Conference on Software Engineering, 2004
Proceedings of the 28th International Computer Software and Applications Conference (COMPSAC 2004), 2004
2003
J. Syst. Softw., 2003
Int. J. Distance Educ. Technol., 2003
IACR Cryptol. ePrint Arch., 2003
Efficient Forward and Provably Secure ID-Based Signcryption Scheme with Public Verifiability and Public Ciphertext Authenticity.
Proceedings of the Information Security and Cryptology, 2003
2001
Security of Wang et al.'s group-oriented (t, n) threshold signature schemes with traceable signers.
Inf. Process. Lett., 2001
2000
Proceedings of the Public Key Cryptography, 2000
Proceedings of the 33rd Annual Hawaii International Conference on System Sciences (HICSS-33), 2000
Proceedings of the 24th International Computer Software and Applications Conference (COMPSAC 2000), 2000
1999
Proceedings of the Internet Applications, 5th International Computer Science Conference, 1999
Proceedings of the 23rd International Computer Software and Applications Conference (COMPSAC '99), 1999
1997
1996
Analyzing Self-Adjusting Linear List Algorithms with Deletions and Unsuccessful Searches.
Inf. Process. Lett., 1996
Comput. J., 1996
Proceedings of the Computing and Combinatorics, Second Annual International Conference, 1996
1995
IEEE Trans. Neural Networks, 1995
J. Syst. Softw., 1995
Proceedings of the Computing and Combinatorics, First Annual International Conference, 1995
1994
Proceedings of the Algorithms and Computation, 5th International Symposium, 1994
1993
Randomized Competitive Algorithms for Successful and Unsuccessful Search on Self-adjusting Linear Lists.
Proceedings of the Algorithms and Computation, 4th International Symposium, 1993
1992
Proceedings of the Third Annual ACM/SIGACT-SIAM Symposium on Discrete Algorithms, 1992
Proceedings of the Combinatorial Pattern Matching, Third Annual Symposium, 1992