Showing results 1 to 20 of 27
next >
Title | Author(s) | Issue Date | |
---|---|---|---|
An Attack on Libert et al.’s ID-Based Undeniable Signature Scheme Journal:International Journal of Network Security | 2007 | ||
BTM - An automated rule-based BT monitoring system for piracy detection Proceeding/Conference:International Conference on Internet Monitoring and Protection, ICIMP 2007 | 2007 | ||
Conferences in Research and Practice in Information Series(Proceedings of the 27th Australasian Computer Science Conference) Proceeding/Conference:Tuning the collision test for power | 2004 | ||
Cross-Referencing for Bilingual Electronic Legal Documents in HKLII Proceeding/Conference:Proceedings of The 6th Conference on Computerisation of Law via the Internet | 2004 | ||
Cryptanalysis of Harn digital multisignature scheme with distinguished signing authorities Journal:Electronics Letters | 2000 | ||
Delegation of Signing and Decryption Rights using PKI Proxy Memo Proceeding/Conference:Proceedings of the IASTED International Conference in Software Engineering | 2004 | ||
Design of a Cyber Forensic Tool Proceeding/Conference:International Transnational Organized Crime Conference | 2002 | ||
The Differential Analysis of Reduced Skijack Variants from The First Round Proceeding/Conference:Proceedings of The ChinaCrypt2002 Conference | 2002 | ||
Digital evidence search kit Proceeding/Conference:Proceedings - First International Workshop on Systematic Approaches to Digital Forensic Engineering | 2005 | ||
An efficient bloom filter based solution for multiparty private matching Proceeding/Conference:Proceedings of The 2006 International Conference on Security and Management, SAM'06 | 2006 | ||
A hybrid approach for authenticating MPEG-2 streaming data Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2007 | ||
IDR: An intrusion detection router for defending against Distributed Denial-of-Service (DDoS) attacks Proceeding/Conference:Proceedings of the International Symposium on Parallel Architectures, Algorithms and Networks, I-SPAN | 2004 | ||
An improved authenticated key agreement protocol with perfect forward secrecy for wireless mobile communication Proceeding/Conference:IEEE Wireless Communications and Networking Conference, WCNC | 2005 | ||
Intrusion detection routers: Design, implementation and evaluation using an experimental testbed Journal:IEEE Journal on Selected Areas in Communications | 2006 | ||
Just curious: an interview with John Cocke Journal:Computer | 1999 | ||
Processing Legal Documents in the Chinese-Speaking World: the Experience of HKLII Proceeding/Conference:Conference on Computerization of Law via the Internet | 2003 | ||
Protecting digital legal professional privilege LPP data Proceeding/Conference:Proceedings of the 3rd International Workshop on Systematic Approaches to Digital Forensic Engineering, SADFE 2008 | 2008 | ||
2002 | |||
Risk management of corporate confidential information in digital form Proceeding/Conference:Proceedings - International Computer Software and Applications Conference | 2004 | ||
Secure and Practical Tree-structure Signature Schemes Based on Discrete Logarithms Proceeding/Conference:Public Key Cryptography. PKC 2000 | 2000 |