Discovery - Top 10
Type
Date issued
Journal/Proceeding/Conference
(1)
Language
(50)
HKU Organizations
Search
Add filters:
Use filters to refine the search results.
Title | Author(s) | Issue Date | |
---|---|---|---|
Strong Cryptographic Library - Implementation and Applications Proceeding/Conference:Proceedings of the 9th Hong Kong computer Society Database Conference | 1999 | ||
1993 | |||
1989 | |||
1993 | |||
1989 | |||
Digital evidence search kit Proceeding/Conference:Proceedings - First International Workshop on Systematic Approaches to Digital Forensic Engineering | 2005 | ||
Separable and anonymous identity-based key issuing Proceeding/Conference:Proceedings of the International Conference on Parallel and Distributed Systems - ICPADS | 2005 | ||
Public release of the software Strong Cryptographic Library version 2.0 which includes the world's strongest random number generator Book:Center of Information Security and Cryptography | 2000 | ||
Just curious: an interview with John Cocke Journal:Computer | 1999 | ||
Efficiently rendering large volume data using texture mapping hardware Proceeding/Conference:Joint EUROGRAPHICS - IEEE TCCG Symposium on Visualization Proceedings | 1999 | ||
Probabilistic segmentation of volume data for visualization using SOM-PNN classifier Proceeding/Conference:IEEE Symposium on Volume Visualization | 1998 | ||
Finding motifs for insufficient number of sequences with strong binding to transcription factor Proceeding/Conference:RECOMB 2004 - Proceedings of the Eighth Annual International Conference on Research in Computational Molecular Biology | 2004 | ||
Secure and Practical Tree-structure Signature Schemes Based on Discrete Logarithms Proceeding/Conference:Public Key Cryptography. PKC 2000 | 2000 | ||
What an Investigator Needs to Know about Encryption & Tracking Technologies Proceeding/Conference:Asia Cyber Crime Summit | 2001 | ||
Design of a Cyber Forensic Tool Proceeding/Conference:International Transnational Organized Crime Conference | 2002 | ||
The chi-square test when the expected frequencies are less than 5 Proceeding/Conference:Proceedings of the COMPSTAT 2006, 17th Symposium of IASC | 2006 | ||
Delegation of Signing and Decryption Rights using PKI Proxy Memo Proceeding/Conference:Proceedings of the IASTED International Conference in Software Engineering | 2004 | ||
Randomly generating triangulations of a simple polygon Proceeding/Conference:Lecture Notes in Computer Science | 2005 | ||
An Attack on Libert et al.’s ID-Based Undeniable Signature Scheme Journal:International Journal of Network Security | 2007 | ||
Intrusion detection routers: Design, implementation and evaluation using an experimental testbed Journal:IEEE Journal on Selected Areas in Communications | 2006 | ||
Some difficult-to-pass tests of randomness Journal:Journal of Statistical Software | 2002 | ||
A Note on the comparison of five heuristic optimization techniques of a certain class of decision trees Journal:Information Sciences | 1991 | ||
The Monty Python Method for Generating Random Variables Journal:ACM Transactions on Mathematical Software | 1998 | ||
The ziggurat method for generating random variables Journal:Journal of Statistical Software | 2000 | ||
Toward a universal random number generator Journal:Statistics and Probability Letters | 1990 |