Kwok-Yan Lam
Cited by
Cited by
SAODV: a MANET routing protocol that can withstand black hole attack
S Lu, L Li, KY Lam, L Jia
2009 international conference on computational intelligence and security 2 …, 2009
Blockchain for future smart grid: A comprehensive survey
MB Mollah, J Zhao, D Niyato, KY Lam, X Zhang, AMYM Ghias, LH Koh, ...
IEEE Internet of Things Journal 8 (1), 18-43, 2020
Wireless Communication and Security Issues for Cyber– Physical Systems and the Internet-of-Things
A Burg, A Chattopadhyay, KY Lam
Proceedings of IEEE 106 (1), 38-60, 2018
Several classes of binary sequences with three-level autocorrelation
C Ding, T Helleseth, KY Lam
IEEE Transactions on Information Theory 45 (7), 2606-2612, 1999
Blockchain for the internet of vehicles towards intelligent transportation systems: A survey
MB Mollah, J Zhao, D Niyato, YL Guan, C Yuen, S Sun, KY Lam, LH Koh
IEEE Internet of Things Journal 8 (6), 4157-4185, 2020
A blockchain framework for insurance processes
M Raikwar, S Mazumdar, S Ruj, SS Gupta, A Chattopadhyay, KY Lam
2018 9th IFIP International Conference on New Technologies, Mobility and …, 2018
Local differential privacy-based federated learning for internet of things
Y Zhao, J Zhao, M Yang, T Wang, N Wang, L Lyu, D Niyato, KY Lam
IEEE Internet of Things Journal 8 (11), 8836-8853, 2020
Overlap-free Karatsuba–Ofman polynomial multiplication algorithms
H Fan, J Sun, M Gu, KY Lam
IET Information security 4 (1), 8-14, 2010
A fast algorithm for determining the linear complexity of a sequence with period p/sup n/over GF (q)
G Xiao, S Wei, KY Lam, K Imamura
IEEE Transactions on Information Theory 46 (6), 2203-2206, 2000
A method for obtaining cryptographically strong 8/spl times/8 S-boxes
X Yi, SX Cheng, XH You, KY Lam
GLOBECOM 97. IEEE Global Telecommunications Conference. Conference Record 2 …, 1997
Undeniable billing in mobile communication
J Zhou, KY Lam
Proceedings of the 4th annual ACM/IEEE international conference on Mobile …, 1998
Joint Pricing and Power Allocation for Multibeam Satellite Systems with Dynamic Game Model
F Li, KY Lam, X Liu, J Wang, K Zhao, L Wang
IEEE Transactions on Vehicular Technology 67 (3), 2398 - 2408, 2018
A generalization of algebraic-geometry codes
C Xing, H Niederreiter, KY Lam
IEEE Transactions on Information Theory 45 (7), 2498-2501, 1999
Trust based routing for misbehavior detection in ad hoc networks
W Gong, Z You, D Chen, X Zhao, M Gu, KY Lam
Journal of Networks 5 (5), 551, 2010
Lightweight security for mobile commerce transactions
KY Lam, SL Chung, M Gu, JG Sun
Computer Communications 26 (18), 2052-2060, 2003
Autonomous vehicle: Security by design
A Chattopadhyay, KY Lam, Y Tavva
IEEE Transactions on Intelligent Transportation Systems 22 (11), 7015-7029, 2020
Securing digital signatures for non-repudiation
J Zhou, KY Lam
Computer Communications 22 (8), 710-716, 1999
Local Differential Privacy and Its Applications: A Comprehensive Survey
M Yang, L Lyu, J Zhao, T Zhu, KY Lam
arXiv preprint arXiv:2008.03686, 2020
Privacy-preserving federated learning for UAV-enabled networks: learning-based joint scheduling and resource management
H Yang, J Zhao, Z Xiong, KY Lam, S Sun, L Xiao
IEEE Journal on Selected Areas in Communications 39 (10), 3144-3159, 2021
Mobile IP registration protocol: a security attack and new secure minimal public-key based authentication
KY Lam
Proceedings Fourth International Symposium on Parallel Architectures …, 1999
The system can't perform the operation now. Try again later.
Articles 1–20