Search For:

Displaying 1-14 out of 14 total
Separable and Anonymous Identity-Based Key Issuing
Found in: Parallel and Distributed Systems, International Conference on
By Ai-fen Sui, Sherman S.M. Chow, Lucas C.K. Hui, S.M. Yiu, K.P. Chow, W.W. Tsang, C.F. Chong, K.H. Pun, H.W. Chan
Issue Date:July 2005
pp. 275-279
<p>In identity-based (ID-based) cryptosystems, a local registration authority (LRA) is responsible for authentication of users while the key generation center (KGC) is responsible for computing and sending the private keys to users and therefore, a s...
 
Sockpuppet Detection in Online Discussion Forums
Found in: Intelligent Information Hiding and Multimedia Signal Processing, International Conference on
By Xueling Zheng,Yiu Ming Lai,K.P. Chow,Lucas C.K. Hui,S.M. Yiu
Issue Date:October 2011
pp. 374-377
One common trick to cheat people to believe fake products or a high-return low-risk investment scheme in the online discussion groups is t0 make use of sock puppets (i.e., use different fake identities pretending to be different persons to praise or create...
 
Modeling Web Navigation by Statechart
Found in: Computer Software and Applications Conference, Annual International
By Karl R.P.H. Leung, Lucas C.K. Hui, S.M. Yiu, Ricky W.M. Tang
Issue Date:October 2000
pp. 41
There is a trend of increasing size of web sites and increasing complexity of web pages by dynamic content in recent years. Currently available web navigation modeling tools are unable to cope with the need of modeling these contemporary web sites, especia...
 
Privacy Preserving Multiple Keyword Search for Confidential Investigation of Remote Forensics
Found in: Multimedia Information Networking and Security, International Conference on
By Shuhui Hou,Tetsutaro Uehara,S.M. Yiu,Lucas C.K. Hui,K.P. Chow
Issue Date:November 2011
pp. 595-599
Remote forensics can help investigators perform investigation without need to ship hard drives or travel to a remote location. With increased use of cloud computing technologies, it is becoming more and more difficult to perform post-event forensic investi...
 
Privacy Preserving Confidential Forensic Investigation for Shared or Remote Servers
Found in: Intelligent Information Hiding and Multimedia Signal Processing, International Conference on
By Shuhui Hou,Tetsutaro Uehara,S.M. Yiu,Lucas C.K. Hui,K.P. Chow
Issue Date:October 2011
pp. 378-383
It is getting popular that customers make use of third party data service providers to store their data and emails. It is common to have a large server shared by many different users. This creates a big problem for forensic investigation. It may not be eas...
 
JSBiRTH: Dynamic JavaScript Birthmark Based on the Run-Time Heap
Found in: Computer Software and Applications Conference, Annual International
By Patrick P.F. Chan,Lucas C.K. Hui,S.M. Yiu
Issue Date:July 2011
pp. 407-412
JavaScript is currently the dominating client-side scripting language in the web community. However, the source code of JavaScript can be easily copied through a browser. The intellectual property right of the developers lacks protection. In this paper, we...
 
Memory Efficient Algorithms for Structural Alignment of RNAs with Pseudoknots
Found in: IEEE/ACM Transactions on Computational Biology and Bioinformatics
By Thomas K.F. Wong,Y.S. Chiu,T.W. Lam,S.M. Yiu
Issue Date:January 2012
pp. 161-168
In this paper, we consider the problem of structural alignment of a target RNA sequence of length n and a query RNA sequence of length m with known secondary structure that may contain simple pseudoknots or embedded simple pseudoknots. The best known algor...
 
RFID Forward Secure Authentication Protocol: Flaw and Solution
Found in: Complex, Intelligent and Software Intensive Systems, International Conference
By Kin Ying Yu, S.M. Yiu, Lucas C.K. Hui
Issue Date:March 2009
pp. 627-632
RFID is a widely adopted technology in the enterprises for inventory checking and management. Due to the ubiquitous nature of RFID, attackers can easily launch attacks over wireless channel whenever there is a flaw on the RFID authentication protocol being...
 
Chained Threshold Proxy Signature without and with Supervision
Found in: Computer Science and Software Engineering, International Conference on
By Zoe L. Jiang, S.M. Yiu, L.C.K. Hui, Y. Dong, S.H.Y. Wong
Issue Date:December 2008
pp. 837-840
Threshold Proxy Signature (TPS) scheme facilitates a manager to delegate his signing capability to a group of n subordinates without revealing his own private key, such that a subgroup of at least t ≤ n subordinates is required to generate a proxy signatur...
 
Improving Disk Sector Integrity Using 3-dimension Hashing Scheme
Found in: Future Generation Communication and Networking
By Zoe L. Jiang, Lucas C.K. Hui, K.P. Chow, S.M. Yiu, Pierre K.Y. Lai
Issue Date:December 2007
pp. 141-145
To keep the evidence that a stored hard disk does not modify its content, the intuitive scheme is to calculate a hash value of the data in all the sectors in a specific order. How- ever, since one or more sectors, with some probability, may become a bad se...
 
A Key-Recovery System for Long-term Encrypted Documents
Found in: Enterprise Distributed Object Computing Conference Workshops, IEEE International
By Eric K. Wang, Joe C.K. Yau, Lucas C.K. Hui, Zoe L. Jiang, S.M. Yiu
Issue Date:October 2006
pp. 52
Confidentiality is often one of the primary requirements for electronic documents. Often, encryption is used for achieving these confidential documents. From the perspective of an electronic document system, key management for long-term encrypted documents...
 
Indexing Useful Structural Patterns for XML Query Processing
Found in: IEEE Transactions on Knowledge and Data Engineering
By Wang Lian, Nikos Mamoulis, David Wai-lok Cheung, S.M. Yiu
Issue Date:July 2005
pp. 997-1009
Queries on semistructured data are hard to process due to the complex nature of the data and call for specialized techniques. Existing path-based indexes and query processing algorithms are not efficient for searching complex structures beyond simple paths...
 
Automatic Online Monitoring and Data-Mining Internet Forums
Found in: Intelligent Information Hiding and Multimedia Signal Processing, International Conference on
By Y.M. Lai,Xueling Zheng,K.P. Chow,Lucas C.K. Hui,S.M. Yiu
Issue Date:October 2011
pp. 384-387
With the advancement of internet technology and the change in the mode of communication, it is found that much first-hand news have been discussed in Internet forums well before they are reported in traditional mass media. Also, this communication channel ...
 
Protecting Digital Data Privacy in Computer Forensic Examination
Found in: Systematic Approaches to Digital Forensic Engineering, IEEE International Workshop on
By Frank Y.W. Law,Patrick P.F. Chan,S.M. Yiu,K.P. Chow,Michael Y.K. Kwan,Hayson K.S. Tse,Pierre K.Y. Lai
Issue Date:May 2011
pp. 1-6
Privacy is a fundamental human right defined in the Universal Declaration of Human Rights. To enable the protection of data privacy, personal data that are not related to the investigation subject should be excluded during computer forensic examination. In...
 
 1