Discovery - Top 10
Type
Date issued
Journal/Proceeding/Conference
(13)
(4)
(3)
(2)
(2)
Language
(331)
HKU Organizations
Search
Add filters:
Use filters to refine the search results.
Title | Author(s) | Issue Date | Views | |
---|---|---|---|---|
2017 | 63 | |||
2019 | 40 | |||
An efficient scheme for hard disk integrity check in digital forensics by hashing with combinatorial group testing Journal:International Journal of Digital Content Technology and its Applications | 2011 | 296 | ||
Role activation management in role based access control Proceeding/Conference:Lecture Notes in Computer Science | 2005 | 101 | ||
An Efficient Alignment Algorithm for Searching Simple Pseudoknots over Long Genomic Sequence Journal:IEEE/ACM Transactions on Computational Biology and Bioinformatics | 2012 | 32 | ||
Providing distributed certificate authority service in mobile ad hoc networks Proceeding/Conference:Proceedings - First International Conference on Security and Privacy for Emerging Areas in Communications Networks, SecureComm 2005 | 2005 | 193 | ||
Finding alternative splicing patterns with strong support from expressed sequences on individual exons/introns Journal:Journal of Bioinformatics and Computational Biology | 2008 | 110 | ||
Efficient HMAC-based secure communication for VANETs Journal:Computer Networks | 2012 | 151 | ||
Delegation with supervision Journal:Information Sciences | 2007 | 129 | ||
Related randomness attacks for public key crypto systems Proceeding/Conference:ASIACCS 2015 - Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security | 2015 | 51 | ||
Chained threshold proxy signature without and with supervision Proceeding/Conference:Proceedings - International Conference on Computer Science and Software Engineering, CSSE 2008 | 2008 | 115 | ||
Providing distributed certificate authority service in cluster-based mobile ad hoc networks Journal:Computer Communications | 2007 | 188 | ||
A key-recovery system for long-term encrypted documents Proceeding/Conference:Proceedings - 2006 10th IEEE International Enterprise Distributed Object Computing Conference Workshops, EDOCW2006 | 2006 | 123 | ||
Secure role activation and authorization in the enterprise environment Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2005 | 112 | ||
MetaCluster 5.0: a two-round binning approach for metagenomic data for low-abundance species in a noisy sample Proceeding/Conference:Bioinformatics | 2012 | 47 | ||
Finding motifs with insufficient number of strong binding sites Journal:Journal of Computational Biology | 2005 | 113 | ||
Finding Linear Motif Pair from Protein Interaction Networks: A Probabilistic Approach Proceeding/Conference:The 6th Annual International Conference on Computational Systems Bioinformatics Conference (CSB 2007) | 2007 | 77 | ||
Forward-secure multisignature and blind signature schemes Journal:Applied Mathematics and Computation | 2005 | 384 | ||
Automatic Construction of Online Catalog Topologies Using Decision Trees Proceeding/Conference:2nd International Conference on Electronic Commerce and Web Technologies (EC-Web 2001) | 2001 | 84 | ||
High throughput short read alignment via bi-directional BWT Proceeding/Conference:Proceedings of the IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2009 | 2009 | 180 | ||
Two improved partially blind signature schemes from bilinear pairings Proceeding/Conference:Lecture Notes in Computer Science | 2005 | 100 | ||
Adaptive phenotype testing for AND/OR items Proceeding/Conference:Lecture Notes In Computer Science | 2011 | 110 | ||
A Forensic Logging System for Siemens Programmable Logic Controllers Proceeding/Conference:IFIP Advances in Information and Communication Technology | 2018 | 65 | ||
Secure Query Processing with Data Interoperability in a Cloud Database Environment Proceeding/Conference:Proceedings of the 2014 ACM SIGMOD International Conference on Management of Data | 2014 | 61 | ||
Towards a better similarity measure for keyword profiling via clustering Proceeding/Conference:IEEE International Computer Software and Applications Conference Proceedings | 2013 | 41 |