Discovery - Top 10
Type
(2885)
(2)
Date issued
(610)
(713)
(625)
(512)
(232)
(152)
(30)
(7)
(5)
Journal/Proceeding/Conference
HKU Organizations
(2887)
(113)
Search
Add filters:
Use filters to refine the search results.
Title | Author(s) | Issue Date | |
---|---|---|---|
Strong Cryptographic Library - Implementation and Applications Proceeding/Conference:Proceedings of the 9th Hong Kong computer Society Database Conference | 1999 | ||
Dual-phase just-in-time workflow scheduling in P2P grid systems Proceeding/Conference:Proceedings of the International Conference on Parallel Processing | 2010 | ||
First look at average-case complexity for planar maximum-likelihood detection Proceeding/Conference:2005 Fifth International Conference on Information, Communications and Signal Processing | 2005 | ||
IDBA-MTP: A Hybrid MetaTranscriptomic Assembler Based on Protein Information Proceeding/Conference:Lecture Notes in Computer Science | 2014 | ||
Primal dual gives almost optimal energy efficient online algorithms Proceeding/Conference:Proceedings of the 25th Annual ACM-SIAM Symposium on Discrete Algorithms | 2014 | ||
Managing Uncertainty in Big Data Proceeding/Conference:DI3: International Workshop on Data Integration,Intelligence, and Interoperability for Smart Cities | 2019 | ||
Augmented feedback in semantic segmentation under image level supervision Proceeding/Conference:Computer Vision – ECCV 2016: 14th European Conference, Amsterdam, The Netherlands, October 11-14, 2016, Proceedings, Part VIII | 2016 | ||
Privacy-Enhancing Consortium Blockchain Proceeding/Conference:Second ACM Workshop on Blockchains, Cryptocurrencies and Contracts (BCC'18) | 2018 | ||
Fuzzy public-key encryption based on biometric data Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2017 | ||
Detecting malicious nodes in medical smartphone networks through euclidean distance-based behavioral profiling Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2017 | ||
Evaluating challenge-based trust mechanism in medical smartphone networks: An empirical study Proceeding/Conference:2017 IEEE Global Communications Conference, GLOBECOM 2017 - Proceedings | 2017 | ||
When query authentication meets fine-grained access control: A zero-knowledge approach Proceeding/Conference:Proceedings of the ACM SIGMOD International Conference on Management of Data | 2018 | ||
Achieving flexibility for ABE with outsourcing via proxy re-encryption Proceeding/Conference:ASIACCS 2018 - Proceedings of the 2018 ACM Asia Conference on Computer and Communications Security | 2018 | ||
Constant-size CCA-secure multi-hop unidirectional proxy re-encryption from indistinguishability obfuscation Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2018 | ||
Public-key encryption resilient to linear related-key attacks Proceeding/Conference:Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST | 2013 | ||
Towards statistical trust computation for medical smartphone networks based on behavioral profiling Proceeding/Conference:IFIP Advances in Information and Communication Technology | 2017 | ||
Exploring effect of location number on map-based graphical password authentication Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2017 | ||
An efficient KP-ABE with short ciphertexts in prime order groups under standard assumption Proceeding/Conference:ASIA CCS 2017 - Proceedings of the 2017 ACM Asia Conference on Computer and Communications Security | 2017 | ||
An Efficient Conditional Privacy-Preserving Authentication Scheme for Vehicular Ad Hoc Networks Using Online/Offline Certificateless Aggregate Signature Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2019 | ||
Blockchain-based threshold electronic voting system Proceeding/Conference:Communications in Computer and Information Science | 2019 | ||
Collusion resistant watermarking schemes for cryptographic functionalities Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2019 | ||
Strongly secure authenticated key exchange from supersingular isogenies Proceeding/Conference:Advances in Cryptology – ASIACRYPT 2019: 25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December 8–12, 2019, Proceedings, Part I | 2019 | ||
A Secure and Efficient Privacy-Preserving Authentication Scheme for Vehicular Networks with Batch Verification Using Cuckoo Filter Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2019 | ||
Lattice-based universal accumulator with nonmembership arguments Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2018 | ||
Practical signatures from the partial fourier recovery problem revisited: A provably-secure and gaussian-distributed construction Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2018 |