What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Lucas Chi Kwong Hui
Google Scholar
20
publications in security and cryptology related venues
Year
Venue
Title
2016
conf/acisp
A Survey on the Cyber Attacks Against Non-linear State Estimation in Smart Grids.
Jingxuan Wang
Lucas Chi Kwong Hui
Siu-Ming Yiu
Xingmin Cui
Eric Ke Wang
Jun-bin Fang
2015
conf/wisec
WeChecker: efficient and precise detection of privilege escalation vulnerabilities in Android apps.
Xingmin Cui
Jingxuan Wang
Lucas Chi Kwong Hui
Zhongwei Xie
Tian Zeng
Siu-Ming Yiu
2014
conf/acisp
CoChecker: Detecting Capability and Sensitive Data Leaks from Component Chains in Android.
Xingmin Cui
Da Yu
Patrick P. F. Chan
Lucas Chi Kwong Hui
Siu-Ming Yiu
Sihan Qing
2013
journals/tifs
Maintaining Hard Disk Integrity With Digital Legal Professional Privilege (LPP) Data.
Zoe Lin Jiang
Jun-bin Fang
Frank Y. W. Law
Pierre K. Y. Lai
Ricci S. C. Ieong
Michael Y. K. Kwan
Kam-Pui Chow
Lucas Chi Kwong Hui
Siu-Ming Yiu
Kevin K. H. Pun
2013
journals/tifs
Heap Graph Based Software Theft Detection.
Patrick P. F. Chan
Lucas Chi Kwong Hui
Siu-Ming Yiu
2012
conf/acisp
Fully Leakage-Resilient Signatures with Auxiliary Inputs.
Tsz Hon Yuen
Siu-Ming Yiu
Lucas Chi Kwong Hui
2012
conf/acns
SPICE - Simple Privacy-Preserving Identity-Management for Cloud Environment.
Sherman S. M. Chow
Yi Jun He
Lucas Chi Kwong Hui
Siu-Ming Yiu
2012
conf/esorics
PE(AR)2: Privacy-Enhanced Anonymous Authentication with Reputation and Revocation.
Kin Ying Yu
Tsz Hon Yuen
Sherman S. M. Chow
Siu-Ming Yiu
Lucas Chi Kwong Hui
2012
conf/icics
Selling Power Back to the Grid in a Secure and Privacy-Preserving Manner.
Tat Wing Chim
Siu-Ming Yiu
Lucas Chi Kwong Hui
Victor O. K. Li
Tin Wing Mui
Yu Hin Tsang
Chun Kin Kwok
Kwun Yin Yu
2012
conf/wisec
DroidChecker: analyzing android applications for capability leak.
Patrick P. F. Chan
Lucas Chi Kwong Hui
Siu-Ming Yiu
2011
conf/ccs
: multiple level authentication scheme for VANETs.
Tat Wing Chim
Lucas Chi Kwong Hui
Siu-Ming Yiu
Victor O. K. Li
2008
conf/cans
Authenticated Directed Diffusion.
Eric Ke Wang
Lucas Chi Kwong Hui
Siu-Ming Yiu
2005
conf/sec
Signcryption in Hierarchical Identity Based Cryptosystem.
Sherman S. M. Chow
Tsz Hon Yuen
Lucas Chi Kwong Hui
Siu-Ming Yiu
2005
conf/acisp
Two Improved Partially Blind Signature Schemes from Bilinear Pairings.
Sherman S. M. Chow
Lucas Chi Kwong Hui
Siu-Ming Yiu
Kam-Pui Chow
2005
conf/acisp
Role Activation Management in Role Based Access Control.
Richard W. C. Lui
Sherman S. M. Chow
Lucas Chi Kwong Hui
Siu-Ming Yiu
2005
conf/acns
Efficient Identity Based Ring Signature.
Sherman S. M. Chow
Siu-Ming Yiu
Lucas Chi Kwong Hui
2004
conf/icisc
Identity Based Threshold Ring Signature.
Sherman S. M. Chow
Lucas Chi Kwong Hui
Siu-Ming Yiu
2004
conf/icics
Secure Hierarchical Identity Based Signature and Its Application.
Sherman S. M. Chow
Lucas Chi Kwong Hui
Siu-Ming Yiu
Kam-Pui Chow
2003
conf/icisc
Efficient Forward and Provably Secure ID-Based Signcryption Scheme with Public Verifiability and Public Ciphertext Authenticity.
Sherman S. M. Chow
Siu-Ming Yiu
Lucas Chi Kwong Hui
Kam-Pui Chow
2000
conf/pkc
Secure and Practical Tree-Structure Signature Schemes Based on Discrete Logarithms.
Xiaoyun Wang
Lucas Chi Kwong Hui
Kam-Pui Chow
Wai Wan Tsang
C. F. Chong
H. W. Chan
Coauthors
C. F. Chong
(1)
Chun Kin Kwok
(1)
Da Yu
(1)
Eric Ke Wang
(2)
Frank Y. W. Law
(1)
H. W. Chan
(1)
Jingxuan Wang
(2)
Jun-bin Fang
(2)
Kam-Pui Chow
(5)
Kevin K. H. Pun
(1)
Kin Ying Yu
(1)
Kwun Yin Yu
(1)
Lucas Chi Kwong Hui
(20)
Michael Y. K. Kwan
(1)
Patrick P. F. Chan
(3)
Pierre K. Y. Lai
(1)
Ricci S. C. Ieong
(1)
Richard W. C. Lui
(1)
Sherman S. M. Chow
(9)
Sihan Qing
(1)
Siu-Ming Yiu
(19)
Tat Wing Chim
(2)
Tian Zeng
(1)
Tin Wing Mui
(1)
Tsz Hon Yuen
(3)
Victor O. K. Li
(2)
Wai Wan Tsang
(1)
Xiaoyun Wang
(1)
Xingmin Cui
(3)
Yi Jun He
(1)
Yu Hin Tsang
(1)
Zhongwei Xie
(1)
Zoe Lin Jiang
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to