Browsing by Author LAM KWOK YAN,KARCH

Select a letter below to browse by last name or type
0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z


Showing results 8 to 25 of 25 < previous 
Issue DateTitleAuthor(s)
Aug-1996Designing a system infrastructure for distributed programsLam, K.-Y. ; Hui, L.C.-K. 
2000Duadic sequences of prime lengthsDing, C. ; Helleseth, T.; Lam, K.Y. 
8-Dec-1994Efficiency of SS(l) square-and-multiply exponentiation algorithmsLam, K.-Y. ; Hui, L.C.K. 
Oct-1996Efficient nearer-ancestor algorithm for network routingLam, K.-Y. ; Hui, L.C.K. 
1-Jan-1994Fast square-and-multiply exponentiation for RSAHui, L.C.K. ; Lam, K.-Y. 
6-Nov-1997Hash function based on block cipherYi, X.; Lam, K.Y. 
Apr-1997Implementing a highly available network directory serviceLam, K.-Y. ; Salkield, T.
1999Mobile IP registration protocol: a security attack and new secure minimal public-key based authenticationSufatrio, Kwok Yan Lam 
Dec-1995Multivariate data analysis software for enhancing system securityLam, K.-Y. ; Hui, L. ; Chung, S.-L. 
1999New construction of algebraic-geometry codesNiederreiter, H.; Xing, C. ; Lam, K.Y. 
2003On identification secret sharing schemesCai, N.; Lam, K.Y. 
Oct-1998On the Efficient Implementation of Fair Non-repudiationYou, C.-H.; Zhou, J.; Lam, K.-Y. 
Dec-1995Replay tolerance of authentication protocolsLam, K.-Y. 
1999Scalable threshold closureZhang, C.; Lam, K.-Y. ; Jajodia, S.
1999Securing digital signatures for non-repudiationZhou, J.; Lam, K.Y. 
1999Sequences with almost perfect linear complexity profiles and curves over finite fieldsXing, C. ; Lam, K.Y. 
1999Several classes of binary sequences with three-level autocorrelationDing, C. ; Helleseth, T.; Lam, K.Y. 
2001The Weight Distribution of C5(1, n)Lam, K.Y. ; Sica, F.