Ir. Dr. HUI Chi Kwong, Lucas (许志光)

Founder and Director of CISC (Center for Information Security and Cryptography), The University of Hong Kong

Associate Professor, Department of Computer Science, The University of Hong Kong

Room 307, Chow Yei Ching Building

Department of Computer Science

The University of Hong Kong

Pokfulam Road, Hong Kong

CISC General Line: (852)2857-8451

Direct Line: (852) 2859-2190

Fax: (852) 2559-8447

Email: hui@cs.hku.hk

Personal Web: http://www.cs.hku.hk/~hui

Department of Computer Science: http://www.cs.hku.hk

CISC: http://www.cs.hku.hk/~cisc

 

Ir Dr Hui is the founder and Honorary Director of the Center for Information Security & Cryptography, and concurrently an associate professor in the Department of Computer Science, The University of Hong Kong. He has published more than one hundred research papers in international journals and conferences, has been invited to be keynote speaker of international conference, and has obtained more than 20 million Hong Kong dollars (more than 2.5 million US dollars) research grants including several industrial collaboration projects. The technology developed in those project had been used by various government and commercial organizations. He also provides consultancy services for security evaluation of software systems and e-payment system, such as the e-cheque initiative by the Hong Kong government.

His research interests include Information Security, Computer Forensics, Cryptographic Systems, Electronic Commerce Security, and Cyber-Physical System Security. He is a member of HKIE and a senior member of IEEE.


 

Education

 

l   Doctor of Philosophy, Computer Science, University of California, Davis. September 1992.

l   Master of Science, Computer Science, University of California, Davis. August 1990.

l   Master of Philosophy, Computer Science, University of Hong Kong. August 1988.

l   Bachelor of Science in Computer Studies, University of Hong Kong. June 1986.

 


 

Experience

 

l   Associate Professor, Department of Computer Science & Information Systems, University of Hong Kong, since January 2000.

l   Honorary Director, Center for Information Security & Cryptography, Department of Computer Science & Information Systems, Faculty of Engineering, University of Hong Kong, since December 1998.

l   Assistant Professor, Department of Computer Science & Information Systems, University of Hong Kong, August 1998 - January 2000.

l   Senior Lecturer, Department of Information Systems & Computer Science, National University of Singapore, July 1997 - July 1998.

l   Lecturer, Department of Information Systems & Computer Science, National University of Singapore, September 1992 - June 1997.

 


 

Professional Activities

 

l   General Chair, The 16th International Conference on Information and Communications Security (ICICS 2014), December 16-17, 2014, Hong Kong, China.

l   General Chair, Information Security, the 17th International Conference (ISC 2014), October 12-14, 2014, Hong Kong, China.

l   General Chair, The Eighth International Conference on Provable Security (ProvSec 2014), October 9-10, 2014, Hong Kong, China.

l   Member, Task Force on Information and Communication Management System  Certification, Hong Kong Accreditation Service (HKAS) under the Innovation and Technology Commission of the HKSAR Government, 2014-17

l   External Reviewer, University of Macau Multi-Year Research Grant, 2014.

l   PC member, The 6th International Conference on Software Security and Reliability (SERE 2012), 2012.

l   PC member, Workshop on Network Forensics, Security and Privacy, (NFSP), 2012

l   Editor, Journal of Information Security (JIS), 2011

l   Associate Editor, Journal of Information Hiding and Multimedia Signal Processing (JIHMSP), 2011.

l   PC member, The 13th International Conference on Information and Communication Security, (ICICS 2011), 2011.

l   Reviewer, IEEE Transactions on Information Forensics and Security, 2011.

l   Reviewer, The Computer Journal, Oxford University Press, 2011.

l   Reviewer, Peer-to-Peer Networking and Applications, 2011.

l   PC member, The 7th Information Security Practice and Experience Conference (ISPEC 2010), 2010.

l   Member of the Task Force on Information and Communication Management System (ICMS) Certification, Hong Kong Accreditation Service, Innovation and Technology Commission, The Government of Hong Kong SAR, June 2011.

l   General Chair, The 6th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2011), Mar 22-24, 2011, Hong Kong, China.

l   Member of Advisory Committee on Code of Practice for Recognized Certification authorities (ACCOP),  Office of the Government Chief Information Officer (OGCIO), The Government of Hong Kong SAR, 2011-02-1 to 2013-01-31.

l   Reviewer, Journal of Systems and Software, 2010.

l   Reviewer, International Journal of Web Engineering and Technology (IJWET), 2010.

l   Reviewer, Information Sciences (INS), Elsevier, 2010.

l   PC member, The 7th Information Security Practice and Experience Conference (ISPEC 2011), 2011.

l   Reviewer, International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, (CyberC 2010), 2010

l   PC member, The 6th International Conference on Security and Privacy in Communication Networks (SecureComm 2010), 2010.

l   Reviewer, The 15th International Conference on Parallel and Distributed Systems (ICPADS 2009), 2009.

l   Panelist, GD-HK Modern Information Technology Services Co-operation and Development Forum -  Cross-Boundary eCommerce Development (Academic Stream) July 11, 2009, Hong Kong, China.

l   Final Year Project External Supervisor, Software Engineering Department, Xiamen University, 2009

l   Program Committee Member, 15th IEEE International Conference on Parallel and Distributed Systems (ICPADS'09) Conference, Security and Trustworthy Computing Track, 9-11 December 2009, Shenzhen, China

l   International Editorial Review Board (ERB) Member, International Journal of Systems and Service-Oriented Engineering (IJSSOE), from 2009

l   General Chair, The 7th International Conference on Cryptology and Network Security (CANS 2008), 2-4 December 2008

l   Reviewer, Journal of Network and Computer Applications, 2008.

l   Reviewer, The Computer Journal, 2008.

l   Reviewer, IEEE Transactions on Parallel and Distributed Systems, 2008.

l   Reviewer, Journal of Systems and Software, 2008.

l   Program Committee Member, 2008 IFIP International Workshop on Network and System Security (NSS 2008), 18-19 October 2008, Shanghai, China

l   Assessor, Hong Kong ICT Awards 2008 – Best Public Service Application Award, HKIE, 2008.

l   Program Committee member, 2007 IFIP International Workshop on Network and System Security (NSS 2007), 20th September 2007, Dalian, China

l   Keynote Speaker, The 3rd Information Security Practice and Experience Conference (ISPEC 2007), 7 - 9 May 2007, Hong Kong, China

l   Program Committee member, The 3rd Information Security Practice and Experience Conference (ISPEC 2007), 7 - 9 May 2007, Hong Kong, China

l   Invited Speaker, Departmental Information Security Coordinator and Information Security Awareness Seminar, The University of Hong Kong, 3 March 2008

l   Reviewer, International Journal of Computer Mathematics, 2007.

l   Program Committee member, ACM Symposium on Information, Computer and Communications Security (AsiaCCS07) 2007, 20-22 March 2007, Singapore.

l   Member, Technical Advisory Committee (TAC) of the Hong Kong ICT Awards 2006: eGovernment. 2006.

l   Reviewer, Future Generation Computer Systems, Elseviers , 2006.

l   Speaker , eHealth Workshop, 2006

l   Speaker , eHealth Forum, 2006

l   Reviewer, Computing and Informatics, UK , 2006.

l   Reviewer, The Seventh International Conference on Web-Age Information Management, 17-19 June, 2006, Hong Kong, China.

l   Reviewer, Computer Journal, 2006.

l   Program Committee member, Applied Cryptography and Information Security (ACIS 06), May 2006, Glasgow, UK.

l   Program Committee member, Forth Annual Conference on Privacy, Security and Trust (PST 2006).

l   Reviewer, Information Science (Elsevier), 2005.

l   Reviewer, Journal on Interconnection Networks (JOIN), 2005.

l   Reviewer, JSAC special issue on high-speed network security, 2005.

l   Reviewer, Special issue of Journal of IAFS 2005, 2005.

l   Reviewer, International Journal of Network Security, 2005.

l   Reviewer, International Journal of Computer Systems Science & Engineering, 2005.

l   Speaker , Forensic workshop Aug 2005

l   Reviewer, Wireless Network Journal, 2005.

l   Reviewer, Communications in Information and Systems journal, 2005.

l   Reviewer, Interacting with Computers, 2005.

l   Reviewer, The Computer Journal, 2005.

l   Program Committee Member, The 4th International Workshop for Applied PKI (IWAP'05), Singapore, September 2005.

l   Member, Hong Kong Institute of Engineers, since 2005.

l   Speaker, "Safeguarding Your IT Assets", Information Technology User-Managers Group (ITUG) Annual Meeting 2004, Hong Kong, 17 Dec 2004.

l   Reviewer, The Computer Journal, 2004.

l   Presentor, DSD SPED training, 040907.

l   Presentor, MV workshop, 040907.

l   Reviewer, ASIAN 04 Conference.

l   Panelist, The 28th Annual International Computer Software and Applications Conference (COMPSAC 2004), September 28-30, 2004.

l   Reviewer, Journal of Zhejiang University Science, 2004.

l   Reviewer, IEEE Transactions on Knowledge and Data Engineering, 2004.

l   Postgraduate Thesis External Examiner , The Chinese University of Hong Kong, 2004.

l   Speaker, Secondary School Seminar: "Computer Crime and Teenage Hacker", Caritas Chong Yuet Ming Secondary School, 10 May, 2004.

l   Reviewer, Journal of Systems and Software, 2004.

l   External Reviewer, RGC proposals, HK, 2004.

l   Speaker, Department of Computer Science Colloquium, City University of Hong Kong, "A Research Project in Intrusion Detection Router", Nov 12, 2003.

l   Country Representative (Hong Kong), 2003 APEC R & D Management Training (ART) Program, Science & Technology Policy Institute, Seoul, Korea, Oct 13-20, 2003.

l   Reviewer, Journal of Systems and Software, 2003.

l   Reviewer, IEEE Transactions on Knowledge and Data Engineering, 2003.

l   Judge, FYI Competition, Intervarsity Internet Technologies Exposition and Conference 2003.

l   Assessor, Hong Kong Awards for Industry, Hong Kong Productivity Council, June 2003.

l   Invited Speaker, ACM seminar on e-Cert and Computer Security, "PKI and Cryptography", October 2002.

l   Invited Speaker,  e-Security Conference 2002, "New Directions in Cryptography", October 2002.

l   Invited Speaker, Hong Kong's New ID Card: Smart Bits and Risks, June 2002.

l   Program Committee Member, The Third International Symposium on E-commerce (ISEC2002), Research Triangle Park, North Carolina, USA , October 2002.

l   Assessor, Hong Kong Awards for Industry, Hong Kong Productivity Council, July 2002.

l   Invited Speaker, HKU 90th Anniversary Symposium on IT Excellence for Development of Hong Kong, Dec 15, 2001.

l   Invited Speaker, New Areas in E-Commerce Seminar, organized by ITSD and The Chinese General Chamber of Commerce, Nov 16, 2001.

l   Invited Speaker, Information Security Seminars, Software Exhibition 2001, Nov 15, 2001.

l   Invited Speaker, 2001 International Cargo Security Seminar, Nov 7-9, 2001.

l   Technology Advisor, i-Security Solutions Ltd, 2001-2003.

l   Speaker, EMSD Seminar "The Application of Smart Card Technology in Information Security", EMSD HKSAR, Aug 10, 2001.

l   Assessor, Hong Kong Awards for Industry, Hong Kong Productivity Council, July 2001.

l   Invited Speaker, Asia CyberCrime Summit 2001, Apr 25-26, 2001.

l   Organizer & Speaker, Training Workshop on PKI and e-Cert for the HKSAR Government Directorate Executive Officers, Feb 27, 2001.

l   Program Committee, The Second Asia-Pacific Conference on Quality Software (APAQS 2001), December 10-11, 2001.

l   Advisor (Training Committee), Information Security and Forensics Society, Nov 2000 - Oct 2002.

l   Fellow, Centre for Criminology, The University of Hong Kong, Nov 2000 - Oct 2003.

l   Panelist, HKICC, 28 Sept, 2000.

l   Invited Speaker, e-cert seminar, HKPC, 14 Sept, 2000.

l   Invited Speaker, ITBB IIAC meeting, 6 July 2000.

l   Program Committee Member, The Second International Symposium on E-commerce (ISEC2001), Hong Kong, April 2001.

l   Program Committee Member, The Tenth World Wide Web Conference (WWW10), Hong Kong,  May 1-5, 2001.

l   Invited Speaker, JETCO Bankers, 30 Jun, 2000.

l   Invited Speaker, "Use of Cryptographic Software in Electronic Commerce", Hong Kong IBM User Group - eConference 2000, 21 Jun, 2000.

l   Invited Speaker, HK Government ETO-PKI seminar, 16 Jun, 2000 (re-run at 5 July 2000).

l   Invited Speaker, Lotus seminar, 12 Jun, 2000.

l   Invited Speaker, IT & I Seminar: Web Based Learning, HK Institute of Education, 31 May 2000.

l   Invited Speaker, Hongkong Post (eCert open to future) PKI workshop, 28 Apr 2000.

l   Invited Speaker, PKI workshop, BCS, 15 Apr 2000.

l   Speaker, Information Security Showcase, 12 Apr 2000.

l   Reviewer (non program committee),  SCI'2000.

l   Invited Speaker, Electronic Transaction Ordinance Workshop, Hong Kong Environmental Protection Department, Hong Kong Government, 22-23, February, 2000.

l   Invited Speaker, E-Commerce & Computer Crime Workshop Hong Kong Police, 27 Jan 2000.

l   Program Committee Member, The first Asia-Pacific Conference on Quality Software (APAQS 2000), October 30-31, 2000.

l   Invited Speaker, Digital Certificate Workshop for DLOs & SSMs, ITSD, Hong Kong Government, 12-13 Jan, 2000.

l   Reviewer (non program committee), International Conference on Software Engineering 2000.

l   Guest Speaker, Inchcape HKU China Scholarship Programme, November 1999.

l   Member, Internal Validation Panel, MSc in Business Information Technology, School of Professional and Continuing Education, The University of Hong Kong, September 1999.

l   Panelist, E-Services World'99 Conference, organized by Hewlett-Packard Hong Kong, September 1999.

l   Invited Speaker, "Usage of Digital Signatures and Encryption in Various Electronic Commerce Activities", Public Key Infrastructure Forums, organized by Hongkong Post, July 1999.

l   Invited Speaker, "Cryptographic Client Suite for Electronic Commerce", Linkage Online Ecommerce Conference, July 1999.

l   Organizing Committee, The Fifth Hong Kong Web Symposium, October 1999.

l   Organizing Committee, The Croucher Advanced Study Institute (ASI) on Cryptographic Techniques for Electronic Commerce, July 1999.

l   Invited Presenter, "Strong Cryptographic Infrastructure for Electronic Commerce", in Second International Workshop on Technological Challenges of Electronic Commerce, Beijing, May 1999.

l   Reviewer (non program committee),  PRDC'99, ISAS'99.

l   Committee Member, IEEE Hong Kong Section Computer Chapter, 1999.

l   External Examiner, for post-graduate candidate - Department of Information Systems, University of Melbourne, 1996.

l   Invited Member, Software Technology Centre, Hong Kong Institute of Vocational Education (Chai Wan), March 1999.

l   Seminar Speaker, Professional Awareness Programme, Hong Kong Institute of Vocational Education (Tsing Yi), March 1999.

l   Organizing Committee, Pacific Rim International Symposium on Dependable Computing (PRDC 1999) December 16-17, 1999.

l   Organizing Committee, The Fifth International Computer Science Conference (ICSC '99) December 13-15, 1999.

l   Program Committee, International Workshop on Cryptographic Techniques and E-Commerce (CrypTEC '99) July 5-8, 1999.

l   Program Committee, 9th Hong Kong Computer Society Database Conference on Database and Electronic Commerce, May 6-8, 1999.

l   Organizer and Speaker, Workshop on Strong Cryptographic Infrastructure 1998, Center for Information Security & Cryptography, University of Hong Kong, December 17, 1998.

l   Invited Speaker,   "Cryptography in Singapore" in International Cryptography Institute 1997: Global Challenges (ICI-97), January, 1998, Washington D.C., organized by National Intellectual Property Law Institute, USA.

l   Invited Speaker, "Implementing Transaction Security with Secure Electronic Transaction (SET) Protocol", in IT Security Incorporating Cyber Security'97, November 1997, Singapore, organized by A.I.C. Singapore.

l   Coordinator, DISCS Systems Security Public Colloquium, October 1997, organized by Centre for Systems Security Research, National University of Singapore. This colloquium was attended by over 200 delegates from industries, government agencies, and foreign institutes.

l   Visiting Researcher, under the Young Asian Scholars Scheme - Department of Information Systems, University of Melbourne, Apr-May 1997.

l   Program Committee & Organizing Committee, International Symposium on Algorithms and Computation (ISAAC) 1997.

l   Panel Scientist, Science-Net Project, organized by Singapore Science Centre & Ministry of Education, 1997.

l   External Reviewer, Young Academics Program, University Research for Graduate Education (URGE) Project, Government of Indonesia, 1997.

l   Visiting Researcher, Department of Information Science, University of Tokyo, Feb 1996.

l   Invited Speaker, "Infrastructure for Smart Card Application", in Smart Cards Asia'96 Conference, January 1996, Singapore, organized by Centre for Management Technology.

l   External Examiner, for post-graduate candidate - Department of Computer Science, University of Melbourne, 1996.

l   Seminar Speaker, "Expert System Methods in Security Monitoring" organized by Special Interest Group - Security Audit & Control (SIG SAC), Singapore Computer Society (SCS), April 1995.

l   External Examiner, for post-graduate candidate - Department of Computer Science, University of Hong Kong, 1995.

l   Senior Member, IEEE and Computer Society, member since 1986.

 


 

Current Research Interest

 

l   Information Security

l   Computer Forensics

l   Cryptographic Systems

l   Electronic Commerce Security

l   Cyber-Physical System Security

 


 

Recent Research Projects/Grants

l   E-cheque Security (2014)

Assess the security of the e-cheque proposal from Hong Kong Monetary Authority, HKSAR.

l   Electronic Payment Security Analysis (2014)

Assess the security of the KISS, a mobile phone payment proposal from SmarTone, HK.

l   Applying advanced Cryptographic Techniques for Privacy Preserving Computation in Cloud Computing Environment (2012-2013)

Amount : $ 61,100 (Hong Kong dollar)

Funding source :  Seed Funding Programme for Basic Research

l   Cyberspace investigation technology using criminal profiling (2011-2012)

Amount : $ 999,810 (Hong Kong dollar)

Funding source :  Innovation and Technology Fund

l   Privacy Preserving Obfuscator for Web Content (2011-2012)

Amount : $ 100,000 (Hong Kong dollar)

Funding source :  Seed Funding Programme for Applied Research

l   Privacy-preserving data mining for hybrid partitioned database (2011-2012)

Amount : $ 58,000 (Hong Kong dollar)

Funding source :  Seed Funding Programme for Basic Research

l   Identifying News from Discussion Forums for Cyber Patrolling using Data Mining Techniques (2010-2011)

Amount : $ 70,000 (Hong Kong dollar)

Funding source :  Seed Funding Programme for Basic Research

l   Cryptanalysis and Implementation of Cipher (2010-2012)

Amount : $ 621,940 (Hong Kong dollar)

Funding source :  NSFC/RGC Joint Research Scheme

l   A Harddisk Integrity Problem with Applications to Computer Forensics (2009 - 2011)

Amount : $ 807,168 (Hong Kong dollar)

Funding source :  Hong Kong Research Grant Council (RGC)

l   Error Correction in Quantum Cryptography (2009 - 2011)

Amount : $90,000 (Hong Kong dollar)

Funding source :  Basic Research Seed Funding, University of Hong Kong

l   Keeping a single private key for different joint projects (2008 - 2010)

Amount : $60,000 (Hong Kong dollar)

Funding source :  Basic Research Seed Funding, University of Hong Kong

l   Design of Cryptographic Schemes for Delegation Network (2006 - 2008)

Amount : $356,000 (Hong Kong dollar)

Funding source :  Hong Kong Research Grant Council (RGC)

l   Forward Secure Cryptographic Schemes for Ad Hoc Network (2005 - 2007)

Amount : $666,036 (Hong Kong dollar)

Funding source :  Hong Kong Research Grant Council (RGC)

l   Authentication for Surveillance System (2004 - 2005)

Amount : $3,123,000 (Hong Kong dollar)

Funding source :  Innovation and Technology Fund, University-Industry Collaboration Programme, Innovation and Technology Commission, The Government of HKSAR, and MultiVision Intelligent Surveillance (Hong Kong) Limited

l   Study of Multi-signer Signature Scheme and Identity Authentication (2003 - 2005)

Amount : $377,149 (Hong Kong dollar)

Funding source :  Hong Kong Research Grant Council (RGC)

l   Development of Digital Evidence Search Kit (2003 - 2004)

Amount : $420,000 (Hong Kong dollar)

Funding source :  Applied Research Seed Funding, University of Hong Kong

l   Secure Preservation of Electronic Documents (2002 - 2005)

Amount : $7,278,000 (Hong Kong dollar)

Funding source :  Innovation and Technology Fund, Innovation and Technology Commission, The Government of HKSAR, and various sponsors

l   Vulnerability Analysis Tools for Cryptographic Keys (2001 - 2002)

Amount : $1,996,000 (Hong Kong dollar)

Funding source :  Innovation and Technology Fund, Innovation and Technology Commission, The Government of HKSAR, and various sponsors

l   Strong Cryptographic Infrastructure for Electronic Commerce (1998 - 2001)

Amount : $7,790,000 (Hong Kong dollar)

Funding source :  Industrial Support Fund, Industry Department, HKSAR, and various sponsors

l   On the Theory and Practice of digital Signatures in Workflow (2000 - 2002)

Amount : $437,817 (Hong Kong dollar)

Funding source :  Hong Kong Research Grant Council (RGC)

 


 

Conference Paper Publications

 

l   Dan T.F. Chan, Lucas Hui, S.M. Yiu

Assessing Cryptographic Signature Schemes From A Legal Perspective, to appear in the 12th International Conference on Privacy, Security and Trust (PST2014), July 2014

l   Cui X., Yu D., Chan P.F., Hui C.K., Yiu S.M. and Qing S.

CoChecker: Detecting Capability and Sensitive Data Leaks from Component Chains in Android, 19th Australasian Conference on Information Security and Privacy. Wollongong, NSW, Australia, Springer, 2014, Springer 2014,  Lecture Notes in Computer Science: 446-453.

l   Chim T.W., Yiu S.M., Yeung C.Y., Li V.O.K. and Hui C.K.

Privacy-preserving, distributed motor vehicle event data recorder, Proceedings of the International Conference on Connected Vehicles and Expo (ICCVE 2013), 2013.

l   Liang Y., Chow K.P., Hui C.K., Fang J., Yiu S.M. and Hou S.H.

Towards a better similarity measure for keyword profiling via clustering, IEEE 37th Annual Computer Software and Applications Conference Workshops (COMPSAC 2013). Kyoto, Japan, 2013, 16-20.

l   Zhang P., Fang J., Li C.C.D., Ching W.H.M., Chim T.W., Hui C.K. and Yiu S.M.

A Simple and Efficient Way to Combine Microcontrollers with RSA Cryptography, WCESC'13 (The World Congress on Engineering and Computer Science 2013), (Best Paper Award), San Francisco, USA, 2013.

l   Chow S.M., He Y., Hui C.K. and Yiu S.M.

SPICE - simple privacy-preserving identity-management for cloud environment, The 10th International Conference on Applied Cryptography and Network Security (ACNS '12). 2012, 526-543.

l   He Y., Zhang P., Hui C.K., Yiu S.M. and Chow K.P.

Cloud Forensics Investigation: Tracing Infringing Sharing of Copyrighted Files in Cloud, Proceeding of 2012 ADFSL Conference on Digital Forensics, Security and Law (ADFSL’12), 30-31 May 2012. Richmond, USA, 121~132.

l   He Y., Chim T.W., Hui C.K. and Yiu S.M.

Non-Transferable Proxy Re-Encryption Scheme, Proceeding of 5th IFIP International Conference on New Technologies, Mobility and Security (NTMS’12), 7-10 May 2012. Istanbul, Turkey.

l   Xiong H., Zhang P., Chim T.W., Yiu S.M. and Hui C.K.

Weighted Average Problem revisited under Hybrid and Malicious Model, 3rd International Conference on Next Generation Information Technology (ICNIT 2012), 24-27 Apr 2012. Seoul, South Korea.

l   Junbin Fang, Zoe Jiang, Kam-Pui Chow, Siu-Ming Yiu, Lucas Hui and Gang Zhou.

MTK-Based Chinese Shanzai Mobile Phone Forensics, the Eighth Annual IFIP WG 11.9 International Conference on Digital Forensics, Pretoria, South Africa, 2012

l   Chan P.F., Hui C.K. and Yiu S.M.

DroidChecker: analyzing Android applications for capability leak, The 5th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec'12). 2012, 125-136. http://dx.doi.org/10.1145/2185448.2185466

l   Cheung J.C.L., Chim T.W., Yiu S.M., Hui C.K. and Li V.O.K.

Credential-based Privacy-Preserving Power Request Scheme for Smart Grid Network, The IEEE Global Communications Conference (IEEE GLOBECOM 2011). 2011. http://dx.doi.org/10.1109/GLOCOM.2011.6134566

l   Shuhui Hou, Tetsutaro Uehara, S.M. Yiu, Lucas C.K. Hui, K.P. Chow.

Privacy Preserving Confidential Forensic Investigation for Shared or Remote Servers, Proceedings of the Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP11), Dalian, China. (Best Paper Award), 2011.

l   Lai, Y.M.; Xueling Zheng; Chow, K.P.; Hui, L.C.K.; Yiu, S.M.

Automatic Online Monitoring and Data-Mining Internet Forums, Proceedings of Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP), Dalian, China. 2011

l   Xueling Zheng; Yiu Ming Lai; Chow, K.P.; Hui, L.C.K.; Yiu, S.M.

Sockpuppet Detection in Online Discussion Forums, Proceedings of Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP), Dalian, China. 2011

l   He Yi-Jun, Patrick P.F. Chan, Lucas C.K. Hui, S.M. Yiu.

“UFLE: A User-friendly Location-free Encryption System for Mobile Users”, Proceeding of The 2011 FTRA International Symposium on Advances in Cryptography, Security and Applications for Future Computing (ACSA-11), Jeju, Korea, pp.3, 2011.

l   Hou S., Uehara T., Yiu S.M., Hui C.K. and Chow K.P.

Privacy Preserving Multiple Keyword Search for Confidential Investigation of Remote Forensics, 2011 Third International Conference on Multimedia Information Networking and Security (MINES 2011), Shanghai, China, 4-6 November 2011.

l   Patrick P.F. Chan, L.C.K. Hui, S.M. Yiu.

Dynamic Software Birthmark for Java based on Heap Memory Analysis, 12th Joint IFIP TC6 and TC11 Conference on Communications and Multimedia Security (CMS 2011), Ghent, Belgium, 2011

l   Zoe L. Jiang, Junbin Fang, Lucas C.K. Hui, S.M. Yiu.

Secure End-to-end Browsing System with Mobile Composition, The 2nd International Conference on Internet Technology and Applications (iTAP2011), Wuhan, China, May 2011

l   Junbin Fang, Zoe L. Jiang, S. M. Yiu, K. P. Chow, Lucas C. K. Hui, Long Chen, Xiamu Niu

A Dual Cube Hashing Scheme for Solving LPP Integrity Problem, The Sixth International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE 2011). 2011.

l   Fang J., Jiang L., Yiu S.M., Chow K.P., Hui C.K. and Chen L.

Protecting LPP Data Using Dual k-Dimensional Hashing Scheme, The Sixth International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE 2011). 2011.

l   Chan P.F., Hui C.K. and Yiu S.M.

JSBiRTH: Dynamic JavaScript Birthmark Based on the Run-time Heap, IEEE Computer Software and Applications Conference (COMPSAC 2011), 2011.

l   Patrick P.F. Chan, Lucas Hui, S.M.

A Privilege Escalation Vulnerability Checking System for Android Applications, 13th IEEE International Conference on Communication Technology (IEEE ICCT 2011), Jinan, China, 2011. (Best Paper Award)

l   He Yi-Jun, Lucas C.K. Hui, S.M. Yiu.

“Avoid Illegal Encrypted DRM Content Sharing with Non-transferable Re-encryption”, Proceeding of 13th International Conference on Communication Technology (IEEE ICCT 2011). pp.703-708, 2011.

l   Chim T.W., Yiu S.M., Hui C.K., and Li V.O.K.

MLAS: Multiple Level Authentication Scheme for VANETs, The Sixth ACM Symposium on Information, Computer and Communications Security (ASIACCS 2011). 2011, 471 - 475.

l   Chim T.W., Yiu S.M., Hui C.K., and Li V.O.K.

PASS: Privacy-preserving Authentication Scheme for Smart Grid Network, Proc. IEEE International Conference on Smart Grid Communications. Brussels, Belgium, 2011.

l   WANG Meiqin, WANG Xiaoyun, CHOW KP & HUI Lucas C.K .

New Differential Cryptanalytic Results for Reduced-Round CAST-128”, IEICE 2010.

l   Junbin Fang, Zoe L. Jiang, S.M. Yiu, L.C.K. Hui, Zichen Li.

Efficient key integrity verification for quantum cryptography using combinatorial group testing, in Quantum Information and Computation VIII, Proc. of SPIE vol. 7702, 77020F, Orlando, USA, 2010. doi:10.1117/12.853234.

l   Ying Yang, K.P. Chow, Lucas C.K. Hui, Chunxiao Wang, Lijuan Chen, Zhenya Chen, Jenny Yuan Chen.

Cyber-Forensics Requirements in China: a case study using DESK, to appear in Proceedings of The Sixth Annual IFIP WG 11.9 International Conference on Digital Forensics, Hong Kong, January 2010.

l   Junbin Fang, Zoe L. Jiang, S.M. Yiu, L.C.K. Hui.

"Hard Disk Integrity Check by Hashing with Combinatorial Group Testing" in The 2009 International Workshop on Forensics for Future Generation Communication environments (F2GC-09), pp. 569-574, Jeju Island, Korea, 2009. 

l   T. W. Chim, S. M. Yiu, L. C. K. Hui, Zoe L. Jiang, and V. O. K. Li.

“SPECS: Secure and Privacy Enhancing Communications for VANET,” in ADHOCNETS’09, Sept. 2009.

l   Eric Ke Wang, Lucas Chi Kwong Hui, Siu-Ming Yiu.

“A New Practical Scheme for Protecting Web Content”. Security and Management 2009 (SAM’2009): 62-66.

l   Eric Ke Wang, Yi-Jun He, L.C.K.Hui and S.M.Yiu.

A Practical SMS-Based Mutual Authentication Protocol for Secure Online Banking, Proceeding of International Conference on Security & Management (SAM'09), U.S.A., July, 2009, 

l   Kin Ying Yu, S.M. Yiu, Lucas C.K. Hui.

RFID Forward Secure Authentication Protocol: Flaw and Solution, the 3rd International Workshop on Intelligent, Mobile and Internet Services in Ubiquitous Computing (IMIS 2009), in conjunction with 3rd International Conference on Complex, Intelligent and Software Intensive Systems (CISIS-2009), Fukuoka, Japan, March 16-19, 2009, pp. 627-632. 

l   Zoe L. Jiang, S.M. Yiu, L.C.K. Hui, Y. Dong, S.H.Y. Wong.

Chained Threshold Proxy Signature without and with Supervision, in Proceedings of 2008 International Conference on Computer Science and Software Engineering (CSSE 2008), Wuhan, China, December 12-14, 2008.

l   Eric K. Wang, Lucas C.K.Hui, S.M.Yiu.

Authenticated Directed Diffusion, in Proceedings of The 7th International Conference on Cryptology and Network Security (CANS 2008), Hong Kong, China, December 2-4, 2008, pp.366-377. (SCI, EI, ACM, IEL, LNCS)

l   Frank Y.W. Law, Pierre K.Y. Lai, Zoe L. Jiang, Ricci S.C. Ieong, Michael Y.K. Kwan, K.P. Chow, Lucas C.K. Hui, S.M. Yiu, C.F. Chong.

Protecting Digital Legal Professional Privilege (LPP) Data, in Proceedings of the third International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE 2008), Oakland, California, USA, May 18-22, 2008. pp. 91-101. (Best Paper Award)

l   Zoe L. Jiang, Lucas C.K. Hui, and S.M. Yiu.

Improving Disk Sector Integrity Using k-dimension Hashing, Fourth Annual IFIP WG 11.9 International Conference on Digital Forensics, Kyoto, Japan, January 27 - 30, 2008.  Japan, Springer Boston, 2008, 285: 87- 98.

l   Zoe L. Jiang, Lucas C.K. Hui, K.P. Chow, S.M. Yiu and Pierre K.Y. Lai.

Improving Disk Sector Integrity Using 3-dimension Hashing Scheme, The 2007 International Workshop on Forensics for Future Generation Communication environments (F2GC-07), Jeju Island, Korea, December 6 – 8, 2007, pp. 141-145.

l   K.P. Chow, K.Y. Cheng, L.Y. Man, Pierre K.Y. Lai, Lucas C.K. Hui, C.F. Chong, K.H. Pun, W.W. Tsang, H.W. Chan, S.M. Yiu.

BTM – An Automated Rule-based BT Monitoring System for Piracy Detection, in Proceedings of the Second International Conference on Internet Monitoring and Protection ( ICIMP 2007), IEEE Computer Science Press.

l   Y. Dong, A.F. Sui, S.M. Yiu, Victor O.K. Li, Lucas C.K. Hui, and H.W. Go.

An Efficient Cluster-based Proactive Secret Share Update Scheme for Mobile Ad Hoc Networks, in 2007 IEEE International Conference on Communications (ICC 2007).

l   Y. Dong, Victor O.K. Li, Lucas C.K. Hui, and S.M. Yiu.

Dynamic Distributed Certificate Authority Ser-vices for Mobile Ad Hoc Networks, in Proceedings of IEEE Wireless Communications & Networking Conference 2007 (WCNC 2007).

l   Wang M., Li L., Yiu S.M., Hui C.K., Chong C.F., Chow K.P., Tsang W.W., Chan H.W. and Pun K.H.

A Hybrid Approach for Authenticating MPEG-2 Streaming Data, Proceedings of Multimedia Content Analysis and Mining International Workshop (MCAM 2007). Weihai, China, Springer-Verlag Berlin Heidelberg, June 30 - July 1, 2007, 203-212.

l   Hui C.K., Chow K.P. and Yiu S.M.

Tools and Technology for Computer Forensics: Research and Development in Hong Kong Proceedings of The 3rd Information Security Practice and Experience Conference ( ISPEC 2007 ).Hong Kong, China, Springer Berlin / Heidelberg, May 7 – 9, 2007, 4464/2007: 11-19.

l   Eric K. Wang, J.C.K. Yau, L.C.K. Hui, S.M. Yiu, Z.L. Jiang.

A Key-Recovery System for Long-Term Encrypted Documents, Proceedings of The Tenth IEEE International EDOC Conference (EDOC 2006) Workshops, October 16-20, 2006, Hong Kong SAR, China. (ACM,IEL )

l   Eric K. Wang, S.M. Yiu, L.C.K. Hui.

DGPB: A Distributed Group Key Agreement Scheme for Partition Based Wireless Ad Hoc Network, in Proceedings of ChinaCrypt 2006, p.225-233, October 13-15, 2006, Jinan, Shandong, PRC.

l   Pierre K.Y. Lai, S.M. Yiu, K.P. Chow, C.F. Chong, Lucas C.K. Hui .

An Efficient Bloom Filter Based Solution for Multiparty Private Matching, in Proceedings of the International Conference on Security and Management (SAM'06), Las Vegas, Nevada, USA, June 2006.

l   K.P. Chow, C.F. Chong, K.Y. Lai, L.C.K. Hui, K.H. Pun, W.W. Tsang, H.W. Chan.

Digital Evidence Search Kit, in Proceedings of the First International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE 2005), Taipei, Taiwan, November 7-10, 2005, pp. 187-194. IEEE Computer Society Press.

l   Richard W.C. Lui, Sherman S.M. Chow, Lucas C.K. Hui, S.M. Yiu, Bruce S.N. Cheung.

Decryption Delegation Infrastructure, in Advances in Computational Intelligence and Security: Proceedings of The Workshop of the 2005 International Conference on Computational Intelligence and Security, Xi'an, China, December 2005. Editors: Yuping. Wang, Yiu-ming Cheung, Hailin Liu, pp.93-98.

l   Ricky W.M. Tang, S.M. Yiu, Bruce Cheung, Lucas C.K. Hui, Joe C.K. Yau.

Solving Dilemmas in Information Security Policy, in Advances in Computational Intelligence and Security: Proceedings of The Workshop of the 2005 International Conference on Computational Intelligence and Security, Xi'an, China, December 2005. Editors: Yuping. Wang, Yiu-ming Cheung, Hailin Liu, pp.155-160.

l   S.S.M. Chow, R.W.C. Lui, L.C.K. Hui, S.M. Yiu.

Identity Based Delegation Network, in Proceedings of The International Conference on Cryptology in Malaysia (MyCrypt 2005), 28-29 September 2005. Editors: E. Dawson and S. Vaudenay, Springer-Verlag LNCS Volume 3715, pp.99-115, 2005.

l   Richard W.C. Lui, S.M. Yiu and Lucas C.K. Hui.

Efficient Authorization for Delegation Chains with Strong Non-Repudiation, in Proceedings of the 4th International Workshop for Applied PKI (IWAP'05), Singapore, September 21-23, 2005. J. Zhou et al. (Eds.), pp. 66-77, IOS Press, 2005.

l   Y. Dong, H. W. Go, A. F. Sui, Victor O. K. Li, Lucas C. K. Hui, S. M. Yiu.

Providing Distributed Certificate Authority Service in Mobile Ad Hoc Networks, in Proceedings of the IEEE Conference on Security and Privacy for Emerging Areas in Communication Networks (SecureComm 2005), Athens, Greece, pp. 149 - 156. (acceptance rate: 19.6%, 32 out of 163)

l   Sherman S.M. Chow, S.M. Yiu, and Lucas C.K. Hui.

Efficient Identity Based Ring Signature, In Applied Cryptography and Network Security, Third International Conference, ACNS 2005, New York, USA, June 7-10, 2005, Proceedings. Lecture Notes in Computer Science Volume 3531, pp.499-512, Springer-Verlag, 2005. Full version at Cryptology ePrint Archive, Report 2004/327.  [82 citations (from google scholar)]

l   Richard W.C. Lui , Sherman S.M. Chow , Lucas C.K. Hui, and S.M. Yiu.

Role Activation Management in Role Based Access Control, in Information Security and Privacy: 10th Australasian Conference, ACISP 2005, Brisbane, Australia, July 4-6, 2005. Proceedings Editors: Colin Boyd, Juan M. Gonzalez Nieto, LNCS volume 3574, Springer-Verlag, pp.358-369, 2005.

l   Sherman S.M. Chow, Lucas C.K. Hui, S.M. Yiu, and K.P. Chow.

Two Improved Partially Blind Signature Schemes from Bilinear Pairings, In Information Security and Privacy: Tenth Australasian Conference, ACISP 2005, Brisbane, Australia, July 4-6, 2005. (Acceptance Rate = 45/185 = 24.3%) Proceedings Editors: Colin Boyd, Juan M. Gonzalez Nieto, LNCS volume 3574, Springer-Verlag, pp. 316-328, 2005. Full version at Cryptology ePrint Archive, Report 2004/108.

l   Y. Woo, L.C.K. Hui, K.P. Chow, and S.M. Yiu.

Dynamic Integrity Verification for Software Self-defense, in Proceedings of the 2005 International Conference on Security and Management, (SAM'05), pp. 327-333, Las Vegas, Nevada, USA, June 20-23, 2005.

l   Richard W.C. Lui, Lucas C.K. Hui, S.M. Yiu, and Y. Woo.

A model to support fine-grained delegation of authorization, in Proceedings of the 2005 International Conference on Security and Management, (SAM'05), pp. 208-212, Las Vegas, Nevada, USA, June 20-23, 2005.

l   Richard W.C. Lui, Lucas C.K. Hui and S.M. Yiu.

Secure Role Activation and Authorization in the Enterprise Environment, in Proceedings of the Second European PKI Workshop (EUROPKI 2005), The University of Kent, England, 30 June - 1 July 2005. Editors: D. Chadwick and G. Zhao, Lecture Notes in Computer Science 3545, Springer-Verlag, 2005.

l   Sherman S.M. Chow, Richard W.C. Lui, Lucas C.K. Hui, S.M. Yiu.

Identity Based Ring Signature: Why, How and What Next, in Proceedings of the Second European PKI Workshop (EUROPKI 2005), The University of Kent, England, 30 June - 1 July 2005. Editors: D. Chadwick and G. Zhao, Lecture Notes in Computer Science 3545, pp.144-161, Springer-Verlag, 2005.

l   Richard W.C. Lui, Sherman S.M. Chow, Lucas C.K. Hui and S.M. Yiu.

Efficient Authorization In Delegation With Supervision, in Proceedings of the First International Workshop on Security in Networks and Distributed Systems (SNDS2005), pp. 240-244, in conjunction with the 11th International Conference on Parallel and Distributed Systems (ICPADS-2005), Fukuoka, Japan, July 20-22, 2005. IEEE Computer Society Press. (Best Paper Award)

l   A.-f. Sui, S.S.M. Chow, L.C.K.Hui, S.M.Yiu, K.P. Chow, W.W. Tsang, C.F. Chong, K.H. Pun, H.W. Chan.

Separable and Anonymous Identity-Based Key Issuing, in Proceedings of the First International Workshop on Security in Networks and Distributed Systems (SNDS2005), pp. 275-279, in conjunction with the 11th International Conference on Parallel and Distributed Systems (ICPADS-2005), Fukuoka, Japan, July 20-22, 2005. IEEE Computer Society Press.

l   Sherman S.M. Chow, Lucas C.K. Hui, S.M. Yiu, and K.P. Chow.

An e-Lottery Scheme using Verifiable Random Function, in Proceedings of Computational Science and Its Applications (ICCSA 2005) International Conference, Singapore, May 9-12, 2005, Part III, Internet Communications Security (WICS) Workshop. Editors: Osvaldo Gervasi, Marina L. Gavrilova, Vipin Kumar, et al. Springer-Verlag LNCS Volume 3482, pp.651-660, 2005.

l   Sherman S.M. Chow, Tsz Hon Yuen, Lucas C.K. Hui, and S.M. Yiu

Signcryption in Hierarchical Identity Based Cryptosystem, in Proceedings of the Security and Privacy in the Age of Ubiquitous Computing, IFIP TC11 20th International Conference on Information Security (SEC 2005), May 30 - June 1, 2005, Chiba, Japan. Volume 181/2005, pp. 443 - 457.

l   Joe C.K. Yau, Lucas C.K. Hui, Bruce S.N. Cheung, S.M. Yiu, Y. Woo, K.W. Lau, Eric H.M. Li.

Trustworthy Browsing - A Secure Web Accessing Model, in Proceedings of the 2005 IEEE International Conference on E-Technology, E-Commerce and E-Service (EEE05), pp. 542-547, Hong Kong, 2005.

l   A.F. Sui, L.C.K. Hui, S.M. Yiu, K.P. Chow, W.W. Tsang, C.F. Chong, K.H. Pun, H.W. Chan.

An Improved Authenticated Key Agreement Protocol with Perfect Forward Secrecy for Wireless Mobile Communication, in IEEE Wireless Communications & Networking Conference 2005 (WCNC 2005).

l   H.W.Go, P.Y. Chan, Y. Dong, A.F. Sui, S.M. Yiu, L.C.K. Hui, V. Li.

Performance Evaluation on CRL Distribution using Flooding in Mobile Ad Hoc Networks (MANETs), in 43rd annual ACM Southeast Conference (ACMSE 2005), Kennesaw, GA, USA. March 18-20, 2005.

l   K.H. Pun, Eric Chan, K.P. Chow, C.F. Chong, Jasmine Ma, Lucas Hui, W.W. Tsang, H.W. Chan.

Cross-referencing for Bilingual Electronic Legal Documents, Sixth Conference of Law via the Internet, Paris, France, 3-5 November 2004; http://www.frlii.org/aritcle.php3?id_article=91.

l   Sherman S.M. Chow, Lucas C.K. Hui, and S.M. Yiu.

Identity Based Threshold Ring Signature, Proceedings of the 7th International Conference on Information Security and Cryptology (ICISC 2004), Seoul, Koran. December 2-3, 2004. Springer-Verlay LNCS.

l   Sherman S.M. Chow, Lucas C.K. Hui, S.M. Yiu, and K.P. Chow.

Secure Hierarchical Identity Based Signature and Its Application, in Proceedings of the 6th International Conference on Information and Communications Security (ICICS 2004), Malaga, Spain, October 27-29, 2004. Ed. by J. Lopez, S. Qing and E. Okamoto, pp. 480-494, Lecture Notes in Computer Science 3269, Springer-Verlag.

l   Sherman S.M. Chow, Lucas C.K. Hui, S.M. Yiu, & K.P. Chow.

An e-lottery Scheme using Verifiable Random Function. short presentation in 5th Workshop on Information Security Applications (WISA 2004) Jeju Island, Korea, August 2004.

l   Sherman S.M. Chow, H.W. Go, Lucas C.K. Hui, S.M. Yiu, & K.P. Chow.

Two Forward-Secure Threshold Signature Schemes, in The Second International Conference of Applied Cryptography and Network Security (ACNS 2004) Technical/Industrial Track, Yellow Mountain, China 2004, in Journal of Information Security and Data Confidentiality.

l   Eric Y.K. Chan, H.W. Chan, K.M. Chan, Vivien P.S. Chan, Samuel T. Chanson, Matthew M.H. Cheung, C.F. Chong, K.P. Chow, Albert K.T. Hui, Lucas C.K. Hui, Luke C.K. Lam, W.C. Lau, Kevin K.H. Pun, Anthony Y.F. Tsang, W.W. Tsang, Sam C.W. Tso, Dit-Yan Yeung, K.Y. Yu.

IDR: An Intrusion Detection Router for Defending against Distributed Denial-of-Service (DDoS) Attacks, Proceedings of the Seventh International Symposium on Parallel Architectures, Algorithms and Networks (ISPAN 2004), Hong Kong SAR, May 2004, 581-586.

l   Sherman S.M. Chow, S.M. Yiu, Lucas C.K. Hui, & K.P. Chow.

Efficient Forward and Provably Secure ID-Based Signcryption Scheme with Public Verifiability and Public Ciphertext Authenticity, in Jong In Lim and Dong Hoon Lee, editors, Proceedings of the Sixth Annual International Conference on Information Security and Cryptology (ICISC 2003), Volume 2971 of Lecture Notes in Computer Science, pages 352-369, Seoul, Korea, 2003, Springer-Verlag.

l   Venus L.S. Cheung, Lucas C.K. Hui, S.M. Yiu. [95 citations (from google scholar)]

The Delegation Problem and Practical PKI-based Solutions, in Proceedings of the Sixth International Conference on Enterprise Information Systems (ICEIS 2004), pp. 73-78, Porto, Protugal, April 2004.

l   Venus L.S. Cheung, Lucas C.K. Hui, S.M. Yiu, K.P. Chow, K.H. Pun, W.W. Tsang, H.W. Chan, C.F. Chong.

Delegation of Signing and Decryption Rights using PKI Proxy Memo in Proceedings of the IASTED Software Engineering Conference (SE2004), pp. 281-285, Innsbruck, Austria, February 2004.

l   Richard W.C. Lui & Lucas C.K. Hui.

A Model for Delegation of Accountability, in Proceedings of the IASTED Software Engineering Conference (SE2004), pp. 286-291, Innsbruck, Austria, February 2004.

l   H.W. Go, Y. Dong, Lucas C.K. Hui, S.M. Yiu, Victor O.K. Li.

Applying Forward Security and Threshold Cryptography in Ad Hoc Networks, in Proceedings of The 2004 International Conference on Wireless Networks (ICWN'04), June 21-24, 2004, Las Vegas, Nevada, USA.

l   K.H. Pun, Gary Ip, C.F. Chong, Vivien Chan, K.P. Chow, Lucas Hui, W.W. Tsang, H.W. Chan.

Processing Legal Documents in the Chinese-Speaking World: the Experience of HKLII, Fifth Conference of Law via the Internet, Sydney, Australia, 26-28 November 2003.

l   W.W. Tsang, L.C.K. Hui, K.P. Chow, C.F. Chong & C.W. Tso.

"Tuning the Collision Test for Power", Conferences in Research and Practice in Information Series, Vol. 26. No. 1, pp. 23-30, 2004. (Proceedings of the 27th Australasian Computer Science Conference, Dunedin, New Zealand, 18-22 January 2004).

l   J. Yau, L. Hui, B. Cheung, S.M. Yiu, & V. Cheung .

"Cryptographic Schemes in Secure e-Course eXchange(eCX) for e-Course Workflow", in Proceedings of the International Conference on Advances in Infrastructure for e-Business, e-Education, e-Science, e-Medicine on the Internet (SSGRR 2002s), L'Aquila, Italy, July-Aug 2002.

l   L.C.K Hui, X. Wang, K.P. Chow, W.W. Tsang, C.F. Chong, & H.W. Chan.

"The Differential Analysis of Reduced Skipjack Variants from the First Round", in Proceedings of the ChinaCrypt'2002 Conference, pp. 77-87, Shandong, PRC, Aug 2002.

l   R. Lui & L.C.K. Hui.

"Flexible Authorizations in Workflow Management Systems", in the International Conference on E-Business 2002 (ICEB2002), Beijing, China, May 2002.

l   B.S.N. Cheung, S.L.K. Kwok, L.C.K. Hui, J.K.W. Lee, S.M. Yiu.

"Incorporating Total Quality Management into a Content Engineering Agent", in The Fourth International Conference on New Educational Environments (ICNEE 2002), Lugano, May 8-11, 2002.

l   B. Cheung, L. Hui & S.M. Yiu.

"The Content Engineering Agent: From the TQM perspective", in the World Conference on Educational Multimedia, Hypermedia & Telecommunications (Ed-Media 2002), Colorado, USA, June 2002.

l   J. Yau, L. Hui, B. Cheung, & S.M. Yiu.

"An Online Course Material Copyright Protection Scheme", in International Network Conference 2002 (INC 2002), UK, July 2002.

l   J. Yau, L. Hui, B. Cheung, S.M. Yiu, & J. Lee.

"PowerEdBuilder - A Universal Secure e-Learning Infrastructure", in Proceedings of SSGRR 2002 International Conference on Advances in Infrastructure for e-Business, e-Education, e-Science, and E-Medicine on the Internet (SSRGG-2002W), L'Aquila, Italy, January 2002.

l   J. Zhang, B.S.N. Cheung, & L.C.K. Hui.

"An Intelligent Tutoring System: Smart Tutor", in Proceedings of the World Conference on Educational Multimedia, Hypermedia & Telecommunications (ED-MEDIA 2001), Edited by C. Montgomerie and J. Viteli, June 25-30, 2001.

l   L.C.K. Hui.

"A Practical Algorithm to Find Longest Common Substring in Linear Time", International Journal of Computer Systems Science and Engineering, 2:73-76, March 2000.

l   Karl R.P.H. Leung, L.C.K. Hui, S.M. Yiu, & R.W.M. Tang.

"Modelling Web Navigation by Statechart", in Proceedings of the 24th Annual International Computer Software and Applications Conference (COMPSAC 2000), pp. 41-47, October 2000.

l   X. Wang, L.C.K. Hui, K.P. Chow, W.W. Tsang, C.F. Chong, & H.W. Chan.

"Secure and Practical Tree-structure Signature Schemes Based on Discrete Logarithms", in Proceedings of the International Workshop on Practice and Theory in Public Key Cryptography (PKC2000), January 2000, Melbourne, Australia. Ed. by H. Imai and Y. Zheng, pp. 167-177, Lecture Notes in Computer Science 1751, Springer-Verlag.

l   Karl R.P.H. Leung & L.C.K. Hui.

"Multiple Signature Handling in Workflow Systems". In Proceedings of the Hawaii International Conference on Systems and Science 2000 (HICSS 2000), January 2000, Hawaii, USA. IEEE Computer Society Press.

l   Karl R.P.H. Leung, L.C.K. Hui & Ricky W.M. Tang.

"Integrating Different Signature Purposes in Workflow Systems - a Case Study". In Proceedings of the International Computer Science Conference 1999 (ICSC 99) December 1999, Hong Kong. Ed. by L. Hui and D.L. Lee, pp. 360-366, Lecture Notes in Computer Science, 1749, Springer-Verlag.

l   Karl R.P.H. Leung, L.C.K. Hui & Ricky W.M. Tang.

"Extending the Liaison Workflow Model and Engine to Support Different Signature Purposes". In Proceedings of the Asia Pacific Software Engineering Conference 1999 (APSEC 99), December 1999, Japan. pp. 572-579, IEEE Computer Society Press.

l   Karl R.P.H. Leung & L.C.K. Hui.

"Signature Management in Workflow Systems". In Proceedings of the 23rd Annual International Computer Software and Applications Conference (COMPSAC 99), October 1999, USA. pp. 22-27, IEEE Computer Society Press.

l   B. Cheung, L.C.K. Hui, T. Yim, & V.W.L. Yung.

"Security Design in an Online-Education Project", in e-Education: Challenges and Opportunities. Proceedings of The 5th Hong Kong Web Symposium, pp. 1-14, October 1999.

l   L.C.K. Hui & K. Leung.

"The need of signature semantic handling in electronic workflow systems", in Proceedings of The 5th International Conference on Information Systems Analysis and Synthesis", pp. 158-163, Orlando, Florida, USA, July-Aug 1999.

l   B. Cheung & L.C.K. Hui.

"Student Authentication for a Web-based Distance Learning System", in Proceedings of The 5th International Conference on Information Systems Analysis and Synthesis", pp. 441-446, Orlando, Florida, USA, July-Aug 1999.

l   L.C.K. Hui, K.P. Chow, W.W. Tsang, C.F. Chong, H.W. Chan, V. Chan, K.M. Chan, M. Lee, D. Hung, C.T. Hung, P. Hong, & P. Yeung.

"Strong Cryptographic Library - Implementation and Applications", in Proceedings of the 9th Hong Kong Computer Society Data Base Conference, May 1999.

l   K.Y. Lam, San Ling, & L.C.K. Hui .

"Efficient Generation of Elliptic Curve Cryptosystems", in Proc. of the Second Annual International Computing and Combinatorics Conference, June, 1996, Hong Kong. Ed. by Jin-Yi Cai and Chak-Kuen Wong, pp. 411-416. Lecture Notes in Computer Science, 1090, Springer-Verlag.

l   K.Y. Lam, S. Ling & L.C.K. Hui.

"Generating Secure Elliptic Curves for Public Key Cryptosystems", in Proceedings of the Chinacrypt'96, April, 1996. Eds. D.Y. Pei, R.J. Zhao and J.J. Zhou, pp. 60-64.

l   L.C.K. Hui & K.Y. Lam.

"Analysis and Experimentation on List Update Algorithms", in  Proc. of the First Annual International Computing and Combinatorics Conference, August 1995, Xi'an, China.

l   L.C.K. Hui & C. Martel.

"Analysing Deletions in Self-adjusting Linear List Algorithms", in Proc. of the Fifth Annual International Symposium on Algorithms and Computation, August 1994, Beijing, China. Ed. by Ding-Zhu Du and Xiang-Sun Zhang, pp. 433-441. Lecture Notes in Computer Science, 834, Springer-Verlag.

l   R. Setiono & L.C.K. Hui.

"Quasi-Newton Methods for Neural Network Training with Application to Character Recognition", in Proc. of the International Conference on Neural Networks and Signal Processing, pp. 409-414, November 1993, Guangzhou, China.

l   L.C.K. Hui, S.L. Chung, & K.Y. Lam.

"An Intrusion Detection Architecture for System Security", in Proc. of the European Informatics Congress Computing Systems Architecture'93, October 1993, Munich, Germany. Ed. by P. P. Spies, pp. 332-344, Springer-Verlag.

l   R. Setiono & L.C.K. Hui.

"Some n-bit Parity Problems are Solvable by a Single Hidden Layer Feed-forward Network with Less Than n Units", in Proc. of the International Joint Conference on Neural Networks, pp. 305-308, October 1993, Nagoya, Japan.

l   K.Y. Lam, S.L. Chung, & L.C.K. Hui.

"A Data Reduction Method to Abstract User Behavior Pattern for Intrusion Detection",  in IMA Conference on Mathematics of Dependable Systems, September 1993.

l   L.C.K. Hui & C. Martel.

"Randomized Competitive Algorithms for Successful and Unsuccessful Search", in Proc. of the Fourth Annual International Symposium on Algorithms and Computation, December 1993, Hong Kong. Ed. by K. Ng, P. Raghavan, N. Balasubramanian, and F. Chin, pp. 426-435. Lecture Notes in Computer Science, 762, Springer-Verlag.

l   L.C.K. Hui.

"Color Set Size Problem with Applications to String Matching", in 3rd Combinatorial Pattern Matching Conference, Apr-May 1992, Tucson, Arizona, USA. Ed. by A. Apostolico, M. Crochemore, Z. Galil, and U. Manber, pp. 227-240. Lecture Notes in Computer Science, 644, Springer-Verlag. [119 citations (from google scholar)]

l   L.C.K. Hui & C. Martel.

"On Efficient Unsuccessful Search", in Proceedings of the 3rd ACM-SIAM Symposium on Discrete Algorithms, pp. 217-227 (January 1992).

l   K. P. Chow & L.C.K. Hui.

"Knowledge-based Approach to Airport Staff Rostering: A Case Study", in Expert Systems World Congress Proceedings, J. Liebowitz (Ed.), pp. 46-53, Pergamon Press Inc., (1991).

l   K. P. Chow & L.C.K. Hui.

"Knowledge-based Approach to Scheduling Problems", in Proceedings of the IEEE Asian Electronic Conference 1987, pp. 404-409 (September 1987).

 


 


Journal Paper Publications

 

l   T.W. Chim, S.M. Yiu, Victor O.K. Li, Lucas C.K. Hui and J. Zhong,

"PRGA: Privacy-preserving Recording & Gateway-assisted Authentication of Power Usage Information for Smart Grid," accepted by the IEEE Transactions on Dependable And Secure Computing, April 2014.

l   T.W. Chim, S. M. Yiu, Lucas C. K. Hui and Victor O. K. Li,

"VANET-based Secure Taxi Service,"  Elsevier Ad Hoc Networks Journal,  Vol. 11, Issue 8, pp. 2381-2390, November 2013

l   Jiang Z.L., Fang J.B., Law Y.W., Lai P.K.Y., Ieong R.S.C., Kwan Y.K., Chow K.P., Hui C.K. and Yiu S.M.

“Maintaining hard disk integrity with digital legal professional privilege (LPP) data”, IEEE Transactions on Information Forensics and Security (IEEE IFS), 8(5), p.821-828, 2013

l   Chan P.C.K., Hui C.K. and Yiu S.M.

“Heap graph based software theft detection”, IEEE Transactions on Information Forensics and Security (IEEE IFS), 8(1), p.101-110, 2013

l   J.B. Fang, C. K. Hui, et al.

"Improved Key Integrity Checking for High-speed Quantum Key Distribution using Combinatorial Group Testing with Strongly Selective Family Design", QINP-1161R1, to appear in Quantum Information Processing, 2014 [QINT2014]

l   Chim T.W., Yiu S.M., Hui C.K. and Li V.O.K.

MLAS: multiple level authentication scheme for VANETs, Ad Hoc Networks. 2012, 10(7): 1445 - 1456. http://dx.doi.org/10.1016/j.adhoc.2012.03.020

l   T.W. Chim, S.M. Yiu, Lucas C.K. Hui, Victor O.K. Li,

"VSPN: VANET-based Secure and Privacy-preserving Navigation," IEEE Transactions on Computers, 03 Aug. 2012. IEEE computer Society Digital Library. IEEE Computer Society, http://doi.ieeecomputersociety.org/10.1109/TC.2012.188

l   Chim T.W., Cheung L.J., Yiu S.M., Hui C.K. and Li V.O.K.

PCSS: Privacy-preserving Charging Station Searching for Electric Vehicles, Journal of Information Security (JIS). USA, 2012, 3(1): 59-67.

l   Chim T.W., Yiu S.M., Hui C.K. and Li V.O.K.

Privacy-Preserving Advance Power Reservation, IEEE Communications Magazine Feature Topic on Cyber Security for Smart Grid Communications. USA, 2012.

l   Chim T.W., Yiu S.M., Hui C.K. and Li V.O.K.

“Efficient HMAC-based secure communication for VANETs, ” Computer Networks Journal. 2012, 56(9): 2292-2303. http://dx.doi.org/10.1016/j.comnet. 2012.04.002

l   Fang J., Jiang L., Yiu S.M., Chow K.P., Hui C.K., Chen L., Niu X. and Wang X.

A Dual Cube Hashing Scheme for Solving Hard Disk Integrity Verification Problem, International Journal of Digital Content Technology and its Applications (JDCTA). Korea, 2012, 6(13): 285-296.

l   Pierre K. Y. Lai, K. P. Chow, Lucas C. K. Hui, and S. M. Yiu.

“Modeling the initial stage of a file sharing process on a BitTorrent network,” Peer-to-Peer Networking and Applications, Springer, Dec 2011.

l   Chim T.W., Yiu S.M., Hui C.K., and Li V.O.K.

OPQ: OT-based Private Querying in VANETs, IEEE Transactions on Intelligent Transportation Systems, 2011.

l   Junbin Fang, Zoe Lin Jiang, S.M. Yiu, Lucas C.K. Hui.

“Checking Key Integrity Efficiently for High Speed Quantum Key Distribution by using Combinatorial Group Testing,” Optics Communications, 284(1), pp.531-535, 2010. doi:10.1016/j.optcom.2010.08.066.

l   Junbin Fang, Zoe Lin Jiang, S.M. Yiu, Lucas C.K. Hui.

“An Efficient Scheme for Hard Disk Integrity Check by Hashing with Combinatorial Group Testing,” International Journal of Digital Content Technology and its Applications. Korea, AICIT, 2011, 5, No. 2: 300-308.

l   He Yi-Jun, Patrick P.F. Chan, Lucas C.K. Hui, S.M. Yiu.

“UFLE: A User-friendly Location-free Encryption System for Mobile Users”, accepted by International Journal of Mobile Information Systems (IJMIS) - IOS Press.

l   WANG Meiqin, WANG Xiaoyun, & HUI Lucas C.K.

“Differential-Algebraic Cryptanalysis of Reduced-Round of Serpent-256”, Jo Science in China Series F: Information Science, 2010, 53: doi  10.1007/s11432-010-0048-2.

l   Zoe L. Jiang, S.M.Yiu, Y.Dong, L.C.K. Hui, S.H.Y.Wong.

“Secure Chained Threshold Proxy Signature without and with Supervision”, Journal of Software Engineering and Applications, 2009.

l   Dong Y., Sui A.F., Yiu S.M., Li V.O.K. and Hui C.K.

Providing distributed certificate authority service in cluster-based mobile and hoc networks, Computer Communications. 2007, 30: 2442- 2452.

l   Ying Dong, Tat Wing Chim, Victor O. K. Li, S. M. Yiu and C. K. Hui.

"ARMR: Anonymous Routing protocol with Multiple Routes for Communications in Mobile Ad Hoc Networks," published in Elsevier Ad Hoc Networks Journal, 10.1016/j.adhoc.2009.04.10, 15 pages.

l   Sherman S. M. Chow, H. W. Go, Lucas C. K. Hui, and S. M. Yiu.

Multiplicative Forward-Secure ThresholdSignature Scheme, in International Journal of Network Security, Vol.7:3, pp.397–403, November 2008.

l   Richard W.C. Lui, Lucas C.K. Hui, S.M. Yiu.

Accountability in Organizations, Int. J. Information and Computer Security. UK, Inderscience Enterprises Ltd, 2007, Vol. 1, No. 3: 237-255.

l   Richard W.C. Lui, Lucas C.K. Hui, S.M. Yiu.

Delegation with Supervision, in Information Sciences, 2006/07.

l   Z.C. Li, C.F. Chong, Lucas C.K. Hui, S.M. Yiu, K.P. Chow, W.W. Tsang, H.W. Chan, and K.H. Pun.

An Attack on Libert et al.'s ID-Based Undeniable Signature Scheme, in International Journal of Network Security, Vol.5, No.2, pp. 220-223, September 2007.

l   E.Y.K. Chan, H.W. Chan, K.M. Chan, P.S. Chan, S.T. Chanson, M.H. Cheung, C.F. Chong, K.P. Chow, A.K.T. Hui, L.C.K. Hui, S.K. Ip, C.K. Lam, W.C. Lau, K.H. Pun, Y.F. Tsang, W.W. Tsang, C.W. Tso, D.Y. Yeung, S.M. Yiu, K.Y. Yu, W. Ju.

Intrusion Detection Routers: Design, Implementation and Evaluation Using an Experimental Test-bed, in The IEEE Journal on Selected Areas in Communications, special issue on High-speed Network Security, 2006.

l   Joe C. K. Yau, Lucas C. K. Hui, S. M. Yiu, Bruce S. N. Cheung.

Towards a Secure Copyright Protection Infrastructure for e-Education Material: Principles Learned from Experience, International Journal of Network Security, Vol.2, No.1, pp. 21-28, Jan 2006.

l   Sherman S.M. Chow, Lucas C.K. Hui, S.M. Yiu, and K.P. Chow.

Practical Electronic Lotteries with Offline TTP, in Journal of Computer Communications, special issue for Internet Communications Security, 2005.

l   Aifen Sui, Lucas C. K. Hui, Yixian Yang, K. P. Chow.

Eliptic Curve Cryptography based Authenticated Key Agreement with Pre-shared Password, Journal of Electronics (China), Vol 22, No. 3, pp. 268-272, May 2005.

l   Sherman S.M. Chow, Lucas C.K. Hui, S.M. Yiu, and K.P. Chow.

"Forward-Secure Multisignature and Blind Signature Schemes", Applied Mathematics and Computation, 168:895-908, 2005.

l   Sherman S.M. Chow, Lucas C.K. Hui, S.M. Yiu, K.P. Chow, & Richard W.C. Lui.

A Generic Anti-Spyware Solution by Access Control List at Kernel Level. in Journal of Systems and Software, Special issue: Software Engineering Education and Training - Edited by P. Knoke, A.M. Moreno and M. Ryan Vol 75/1-2 pp 227-234, 2005.

l   B. Cheung, L. Hui, J. Zhang, & S.M. Yiu.

"SmartTutor: An Intelligent Tutoring System in Web-based Adult Education", Journal of Systems and Software, 68, 11-25, 2003.

l   J. Yau, L. Hui, S.M. Yiu, & B. Cheung.

"eCX: a Secure Infrastructure for e-Course Delivery", Internet Research: Electronic Networking Applications and Policy, Vol. 13, No. 2, pp. 116-125, 2003.

l   K.H. Pun, L. Hui, K.P. Chow, W.W. Tsang, C.F. Chong, & H.W. Chan.

"Review of the Electronic Transactions Ordinance: Can the Personal Identification Number Replace the Digital Signature? ", Hong Kong Law Journal, Vol. 32, Part 2, pp. 241-257, 2002.

l   B. Cheung, L. Hui, S. Yiu, J. Lee, L. Kwok, & K. Leung.

"Content Engineering Agent: A TBL-Based E-Course Development Tool with TQM", Journal of Distance Education Technologies, 1(2), pp.57-71, Apr-June 2003.

l   Z.C. Li, L.C.K. Hui, K.P. Chow, C.F. Chong, W.W. Tsang, & H.W. Chan .

"Security of Wang et al.'s Group-oriented (t,n) Threshold Signature Schemes with Traceable Signers", Information Processing Letters, Vol. 80, pp. 295-298, 2001.

l   Karl R.P.H. Leung & L.C.K. Hui.

"Handling Signature Purposes in Workflow Systems", Journal of Systems and Software, Vol. 55, pp.245-259, 2001.

l   Z.C. Li, L.C.K. Hui, K.P. Chow, C.F. Chong, W.W. Tsang, & H.W. Chan.

"Security of Tseng-Jan's Group Signature Schemes", Information Processing Letters, Vol. 75, No. 5, pp.187-189, 2000.

l   Z.C. Li, L.C.K. Hui, K.P. Chow, C.F. Chong, W.W. Tsang, & H.W. Chan.

"Cryptanalysis of Harn's Digital Multisignature with Distinguished Signing Authorities", Electronic Letters, Vol. 36, No. 4, pp.314-315, 2000.

l   B. Cheung, K.P. Chow, L.C.K. Hui, & A.M.K. Yong.

"Railway Track Possession Assignment using Constraint Satisfaction", Engineering Applications of Artificial Intelligence, vol. 12, no. 5, pp. 599-611, 1999.

l   L.C.K. Hui & C. Martel.

"Randomized Competitive Algorithms for Successful and Unsuccessful Search", Computer Journal, vol. 39, no. 5, pp. 427-438, 1996.

l   L.C.K. Hui & C. Martel.

"Analysing Deletions in Self-adjusting Linear List Algorithms", Information Processing Letters, vol. 58, pp. 231-236, 1996.

l   K.Y. Lam, & L.C.K. Hui.

"An Efficient Nearer-Ancestor Algorithm for Network Routing", Journal of Computer & Communications, vol. 19, pp.1014-1019, 1996.

l   K.Y. Lam, L.C.K. Hui, & S.L. Chung.

"A Data Reduction Method for Intrusion Detection", Journal of Systems and Software, vol. 33, pp. 101-108, 1996.

l   R. Setiono & L.C.K. Hui.

"Use of a quasi-Newton method in a feedforward neural network construction algorithm", IEEE Transactions on Neural Networks, vol. 6, no. 1, pp. 273-277, 1995.

l   K.Y. Lam, L.C.K. Hui, & S.L. Chung.

"A Multivariate Data Analysis Software for Enhancing System Security", Journal of Systems and Software, vol. 31, no. 3, pp. 267-275, Dec 1995.

l   K.Y. Lam & L.C.K. Hui.

"Designing a System Infrastructure for Distributed Programs", Journal of Computer & Communications, vol. 19, pp. 754-762, 1995.

l   K.Y. Lam, Kelvin Sung, & L.C.K. Hui.

"A Cardinalised Binary Representation for Exponentiation", Journal of Computer and Math Applications, vol. 30, no. 8, pp. 33-39, 1995.

l   L.C.K. Hui & C. Martel.

"Unsuccessful Search in Self-adjusting Data Structures", Journal of Algorithms, vol. 15, pp. 447-481, 1993.

l   K. P. Chow & L.C.K. Hui.

"Knowledge-based Approach to Airport Staff Rostering", Expert Systems with Applications, Pergamon Press, Vol. 6, pp. 361-375, 1993.

 


 

Invited Publications

 

l   Lucas C.K. Hui, K.P. Chow, and S.M. Yiu.

Tools and Technology for Computer Forensics Research and Development in Hong Kong (Keynote Speech Invited paper), The 3rd Information Security Practice and Experience Conference (ISPEC 2007), 7 - 9 May 2007, Hong Kong, China  in. E. Dawson and D.S. Wong (Eds.): ISPEC 2007, LNCS 4464, pp. 11–19, 2007.Springer-Verlag Berlin Heidelberg 2007

l   L. Hui, K.P. Chow, K.H. Pun, S.M. Yiu, W.W. Tsang, C.F.Chong, H.W. Chan.

Risk Management of Corporate Confidential Information in Digital Form, (invited panel discussion paper), in Proceedings of the 28th Annual International Computer Software and Applications Conference (COMPSAC 2004), pp. 88-89, September 2004.

l   L.C.K. Hui, K.P. Chow, K.H. Pun, W.W. Tsang, H.W. Chan, & C.F. Chong.

"Design of a Cyber Forensic Tool" (invited paper), in Proceedings of the Transnational Organized Crime Conference 2002, March 2002, 88-94.

l   L.C.K. Hui, K.P. Chow, W.W. Tsang, H.W. Chan, & C.F. Chong.

"What an Investigator Needs to Know about Encryption & Tracking Technologies" (invited paper), in Proceedings of the First Asia CryberCrime Summit, pp.219-225, April 25-26, 2001.

 


 

Book Chapters

 

l   Chim T.W., Yiu S.M., Hui C.K. and Li V.O.K.

Grouping-enabled and Privacy-enhancing Communications Schemes for VANETs, Theory and Applications of Ad Hoc Networks. Intech Com, 2011.

l   K.H. Pun, Venus L.S. Cheung, Lucas C.K. Hui, K.P. Chow, W.W. Tsang, H.W. Chan, C.F. Chong.

Computer Crimes: What Everyone Should Know About Them. Book Chapter in Cyber-Crime: The Challenge in Asia, R. Broadhurst and P. Grabosky (Ed.), pp.197-207, Hong Kong University Press, 2005.

l   K. P. Chow & L.C.K. Hui.

"Knowledge-based Approach to Airport Staff Rostering", Book Chapter in Operational Expert Systems in Far East, J K Lee (Ed.), pp. 143-161, Pergamon Press Inc., Oxford, (1991).

 


 

Edited Proceedings

 

l   Sherman S. M. Chow, Jan Camenisch, Lucas C. K. Hui, Siu Ming Yiu (Editors),

"Proceedings of Information Security, the 17th International Conference (ISC 2014)", Lecture Notes in Computer Science, 8783, Springer-Verlag.

l   Sherman S. M. Chow, Joseph K. Liu, Lucas C. K. Hui, Siu Ming Yiu (Editors),

"Proceedings of The Eighth International Conference on Provable Security (ProvSec 2014)", Lecture Notes in Computer Science, 8782, Springer-Verlag.

l   Bruce Cheung, Lucas Chi Kwong Hui, Ravi Sandhu, & Duncan S. Wong, (Editors).

“Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2011)”, ACM, New York, USA, 2011.

l   Matthew K. Franklin, Lucas Chi Kwong Hui & Duncan S. Wong, (Editors).

“Proceedings of The 7th International Conference on Cryptology and Network Security (CANS 2008)”, Lecture Notes in Computer Science, 5339, Springer-Verlag.

l   L.C.K. Hui & D.L. Lee, (Editors).

“Internet Applications: Proceedings of the International Computer Science Conference 1999 (ICSC 99)”, Lecture Notes in Computer Science, 1749, Springer-Verlag.