Skip to main content

previous disabled Page of 2
and
  1. No Access

    Chapter and Conference Paper

    Automatic Construction of Online Catalog Topologies

    The organization of a web site is important to help users get the most out of the site. Designing such an organization, however, is a complicated problem. Traditionally, this design is mainly done by hand. To ...

    Wing -Kin Sung, David Yang, Siu -Ming Yiu in Electronic Commerce and Web Technologies (2001)

  2. No Access

    Chapter and Conference Paper

    A Space and Time Efficient Algorithm for Constructing Compressed Suffix Arrays

    With the first Human DNA being decoded into a sequence of about 2.8 billion base pairs, many biological research has been centered on analyzing this sequence. Theoretically speaking, it is now feasible to acco...

    Tak-Wah Lam, Kunihiko Sadakane, Wing-Kin Sung, Siu-Ming Yiu in Computing and Combinatorics (2002)

  3. No Access

    Chapter and Conference Paper

    Secure Hierarchical Identity Based Signature and Its Application

    At EUROCRYPT 2004, Boneh and Boyen [5] proposed a new hierarchical identity-based (ID-based) encryption (HIBE) scheme provably selective-ID secure without random oracles. In this paper we propose a new hierarc...

    Sherman S. M. Chow, Lucas C. K. Hui in Information and Communications Security (2004)

  4. Chapter and Conference Paper

    Efficient Identity Based Ring Signature

    Identity-based (ID-based) cryptosystems eliminate the need for validity checking of the certificates and the need for registering for a certificate before getting the public key. These two features are desirab...

    Sherman S. M. Chow, Siu-Ming Yiu in Applied Cryptography and Network Security (2005)

  5. No Access

    Chapter and Conference Paper

    Event-Oriented k-Times Revocable-iff-Linked Group Signatures

    In this paper, we introduce the notion of event-oriented k-times revocable if and only if linked group signatures (k-EoRiffL group signatures). In k-EoRiffL group signatures, signers can sign on behalf of a group...

    Man Ho Au, Willy Susilo, Siu-Ming Yiu in Information Security and Privacy (2006)

  6. No Access

    Chapter and Conference Paper

    Space Efficient Indexes for String Matching with Don’t Cares

    Given a text T of length n, the classical indexing problem for pattern matching is to build an index for T so that for any query pattern P, we can report efficiently all occurrences of P in T. Cole et al (2004) e...

    Tak-Wah Lam, Wing-Kin Sung, Siu-Lung Tam, Siu-Ming Yiu in Algorithms and Computation (2007)

  7. No Access

    Chapter and Conference Paper

    An Experimental Study of Compressed Indexing and Local Alignments of DNA

    Recent experimental studies on compressed indexes (BWT, CSA, FM-index) have confirmed their practicality for indexing long DNA sequences such as the human genome (about 3 billion characters) in the main memory...

    Tak-Wah Lam, Wing-Kin Sung, Siu-Lung Tam in Combinatorial Optimization and Applications (2007)

  8. Chapter and Conference Paper

    Identifying Volatile Data from Multiple Memory Dumps in Live Forensics

    One of the core components of live forensics is to collect and analyze volatile memory data. Since the dynamic analysis of memory is not possible, most live forensic approaches focus on analyzing a single snap...

    Frank Law, Patrick Chan, Siu-Ming Yiu, Benjamin Tang in Advances in Digital Forensics VI (2010)

  9. No Access

    Chapter and Conference Paper

    Oblivious Transfer with Access Control : Realizing Disjunction without Duplication

    Oblivious Transfer with Access Control (AC-OT) is a protocol which allows a user to obtain a database record with a credential satisfying the access policy of the record while the database server learns nothin...

    Ye Zhang, Man Ho Au, Duncan S. Wong in Pairing-Based Cryptography - Pairing 2010 (2010)

  10. Chapter and Conference Paper

    Selling Power Back to the Grid in a Secure and Privacy-Preserving Manner

    Smart grid facilitates a customer to sell unused or self-generated power back to the grid. This not only helps the power operator to reduce power generation, but also brings customers a means of getting revenu...

    Tat Wing Chim, Siu Ming Yiu, Lucas Chi Kwong Hui in Information and Communications Security (2012)

  11. Chapter and Conference Paper

    Continual Leakage-Resilient Dynamic Secret Sharing in the Split-State Model

    Traditional secret sharing assume the absolute secrecy of the private shares of the uncorrupted users. It may not hold in the real world due to the side-channel attacks. Leakage-resilient cryptography is propo...

    Hao **ong, Cong Zhang, Tsz Hon Yuen in Information and Communications Security (2012)

  12. Chapter and Conference Paper

    Acceleration of Composite Order Bilinear Pairing on Graphics Hardware

    Recently, composite-order bilinear pairing has been shown to be useful in many cryptographic constructions. However, it is time-costly to evaluate. This is because the composite order should be at least 1024bi...

    Ye Zhang, Chun Jason Xue, Duncan S. Wong in Information and Communications Security (2012)

  13. Chapter and Conference Paper

    Forensic Analysis of Pirated Chinese Shanzhai Mobile Phones

    Mobile phone use – and mobile phone piracy – have increased dramatically during the last decade. Because of the profits that can be made, more than four hundred pirated brands of mobile phones are available in...

    Junbin Fang, Zoe Jiang, Kam-Pui Chow, Siu-Ming Yiu in Advances in Digital Forensics VIII (2012)

  14. Chapter and Conference Paper

    SPICE – Simple Privacy-Preserving Identity-Management for Cloud Environment

    Identity security and privacy have been regarded as one of the top seven cloud security threats. There are a few identity management solutions proposed recently trying to tackle these problems. However, none o...

    Sherman S. M. Chow, Yi-Jun He, Lucas C. K. Hui in Applied Cryptography and Network Security (2012)

  15. Chapter and Conference Paper

    Identity-Based Encryption Resilient to Continual Auxiliary Leakage

    We devise the first identity-based encryption (IBE) that remains secure even when the adversary is equipped with auxiliary input (STOC ’09) – any computationally uninvertible function of the master secret key and...

    Tsz Hon Yuen, Sherman S. M. Chow, Ye Zhang in Advances in Cryptology – EUROCRYPT 2012 (2012)

  16. No Access

    Chapter and Conference Paper

    Relevant Fact Selection for QA via Sequence Labeling

    Question answering (QA) is a very important, but not yet completely resolved problem in artificial intelligence. Solving the QA problem consists of two major steps: relevant fact selection and answering the qu...

    Yuzhi Liang, Jia Zhu, Yupeng Li, Min Yang in Knowledge Science, Engineering and Managem… (2017)

  17. No Access

    Chapter and Conference Paper

    LRCRYPT: Leakage-Resilient Cryptographic System (Design and Implementation)

    Due to the advancement of side-channel attacks, leakage-resilient cryptography has attracted a lot of attention in recent years. Many fruitful results have been proposed by researchers. Most, if not all, of th...

    **aoqi Yu, Nairen Cao, Gongxian Zeng, Ruoqing Zhang in Information Security Applications (2017)

  18. Chapter and Conference Paper

    Privacy-Preserving Elastic Net for Data Encrypted by Different Keys - With an Application on Biomarker Discovery

    Elastic net is a popular linear regression tool and has many important applications, in particular, finding genomic biomarkers for cancers from gene expression profiles for personalized medicine (elastic net i...

    Jun Zhang, Meiqi He, Siu-Ming Yiu in Data and Applications Security and Privacy XXXI (2017)

  19. Chapter and Conference Paper

    A Forensic Logging System for Siemens Programmable Logic Controllers

    Critical infrastructure assets are monitored and managed by industrial control systems. In recent years, these systems have evolved to adopt common networking standards that expose them to cyber attacks. Since...

    Ken Yau, Kam-Pui Chow, Siu-Ming Yiu in Advances in Digital Forensics XIV (2018)

  20. Chapter and Conference Paper

    Enhancing the Security and Forensic Capabilities of Programmable Logic Controllers

    Industrial control systems are used to monitor and operate critical infrastructures. For decades, the security of industrial control systems was preserved by their use of proprietary hardware and software, and...

    Chun-Fai Chan, Kam-Pui Chow, Siu-Ming Yiu, Ken Yau in Advances in Digital Forensics XIV (2018)

previous disabled Page of 2