Browsing by Author rp00110

Jump to: 0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Showing results 1 to 20 of 27  next >
TitleAuthor(s)Issue Date
 
An Attack on Libert et al.’s ID-Based Undeniable Signature Scheme
Journal:International Journal of Network Security
2007
BTM - An automated rule-based BT monitoring system for piracy detection
Proceeding/Conference:International Conference on Internet Monitoring and Protection, ICIMP 2007
2007
 
2004
 
Cross-Referencing for Bilingual Electronic Legal Documents in HKLII
Proceeding/Conference:Proceedings of The 6th Conference on Computerisation of Law via the Internet
2004
 
2000
 
Delegation of Signing and Decryption Rights using PKI Proxy Memo
Proceeding/Conference:Proceedings of the IASTED International Conference in Software Engineering
2004
 
Design of a Cyber Forensic Tool
Proceeding/Conference:International Transnational Organized Crime Conference
2002
 
The Differential Analysis of Reduced Skijack Variants from The First Round
Proceeding/Conference:Proceedings of The ChinaCrypt2002 Conference
2002
 
Digital evidence search kit
Proceeding/Conference:Proceedings - First International Workshop on Systematic Approaches to Digital Forensic Engineering
2005
An efficient bloom filter based solution for multiparty private matching
Proceeding/Conference:Proceedings of The 2006 International Conference on Security and Management, SAM'06
2006
A hybrid approach for authenticating MPEG-2 streaming data
Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2007
IDR: An intrusion detection router for defending against Distributed Denial-of-Service (DDoS) attacks
Proceeding/Conference:Proceedings of the International Symposium on Parallel Architectures, Algorithms and Networks, I-SPAN
2004
An improved authenticated key agreement protocol with perfect forward secrecy for wireless mobile communication
Proceeding/Conference:IEEE Wireless Communications and Networking Conference, WCNC
2005
 
2006
 
1999
 
Processing Legal Documents in the Chinese-Speaking World: the Experience of HKLII
Proceeding/Conference:Conference on Computerization of Law via the Internet
2003
 
Protecting digital legal professional privilege LPP data
Proceeding/Conference:Proceedings of the 3rd International Workshop on Systematic Approaches to Digital Forensic Engineering, SADFE 2008
2008
 
2002
Risk management of corporate confidential information in digital form
Proceeding/Conference:Proceedings - International Computer Software and Applications Conference
2004
 
Secure and Practical Tree-structure Signature Schemes Based on Discrete Logarithms
Proceeding/Conference:Public Key Cryptography. PKC 2000
2000