L. C. K. Hui

From MaRDI portal
(Redirected from Person:1349958)



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Efficient generation of elliptic curve cryptosystems
Lecture Notes in Computer Science
2024-01-29Paper
Analysis and experimentation on list update algorithms
Lecture Notes in Computer Science
2023-12-12Paper
Differential-algebraic cryptanalysis of reduced-round of Serpent-256
Science China Information Sciences
2022-10-28Paper
Security of Tseng-Jan's group signature schemes
Information Processing Letters
2016-06-16Paper
Cochecker: detecting capability and sensitive data leaks from component chains in Android
Information Security and Privacy
2014-07-24Paper
PE(AR)\(^2\): Privacy-enhanced anonymous authentication with reputation and revocation
Computer Security – ESORICS 2012
2013-10-23Paper
Fully leakage-resilient signatures with auxiliary inputs
Information Security and Privacy
2012-09-07Paper
Identity Based Ring Signature: Why, How and What Next
Public Key Infrastructure
2009-04-23Paper
Secure Role Activation and Authorization in the Enterprise Environment
Public Key Infrastructure
2009-04-23Paper
Identity Based Threshold Ring Signature
Lecture Notes in Computer Science
2008-03-17Paper
Delegation with supervision
Information Sciences
2007-10-10Paper
Efficient Identity Based Ring Signature
Applied Cryptography and Network Security
2007-09-24Paper
Progress in Cryptology – Mycrypt 2005
Lecture Notes in Computer Science
2006-10-05Paper
Information Security and Privacy
Lecture Notes in Computer Science
2006-06-22Paper
Information Security and Privacy
Lecture Notes in Computer Science
2006-06-22Paper
Information Security and Cryptology - ICISC 2003
Lecture Notes in Computer Science
2005-12-27Paper
Forward-secure multisignature and blind signature schemes
Applied Mathematics and Computation
2005-11-04Paper
Information and Communications Security
Lecture Notes in Computer Science
2005-08-19Paper
Security of Wang et al. 's group-oriented \((t,n)\) threshold signature schemes with traceable signers
Information Processing Letters
2002-07-25Paper
scientific article; zbMATH DE number 1555962 (Why is no real title available?)2001-01-24Paper
scientific article; zbMATH DE number 1445802 (Why is no real title available?)2000-05-10Paper
Analyzing self-adjusting linear list algorithms with deletions and unsuccessful searches
Information Processing Letters
1997-02-27Paper
scientific article; zbMATH DE number 742968 (Why is no real title available?)1995-04-11Paper
Unsuccessful Search in Self-Adjusting Data Structures
Journal of Algorithms
1994-03-27Paper


Research outcomes over time


This page was built for person: L. C. K. Hui