John C.S. Lui

Results: 50



#Item
11Data security / File hosting / Cryptographic software / Data synchronization / Dropbox / Backup / Public-key cryptography / File system / Remote backup service / Computing / Cloud computing / Software

1 Secure Overlay Cloud Storage with Access Control and Assured Deletion Yang Tang, Patrick P. C. Lee, John C. S. Lui, Radia Perlman Abstract—We can now outsource data backups off-site to third-party cloud storage serv

Add to Reading List

Source URL: www.cs.cuhk.hk

Language: English - Date: 2012-06-30 22:42:56
12Mathematics / Cybernetics / Network science / Degree distribution / Connectivity / B-tree / Generalized scale-free model / Graph theory / Network theory / Networks

Security Adoption in Heterogeneous Networks: the Influence of Cyber-insurance Market Zichao Yang and John C.S. Lui Computer Science & Engineering Department The Chinese University of Hong Kong Abstract. Hosts (or nodes)

Add to Reading List

Source URL: www.cs.cuhk.hk

Language: English - Date: 2012-06-30 22:31:18
13Software / System software / Artificial neuron / Scalability / File sharing / Incentive / ANts P2P / Computing / Peer-to-peer / Neural networks

1 A Mathematical Framework for Analyzing Adaptive Incentive Protocols in P2P Networks Bridge Qiao Zhao, John C.S. Lui, Fellow, ACM/IEEE, Dah-Ming Chiu, Fellow, IEEE

Add to Reading List

Source URL: www.cs.cuhk.hk

Language: English - Date: 2011-07-14 20:48:38
14

Detecting Cheaters for Multiplayer Games: Theory, Design and Implementation[1] S.F. Yeung John C.S. Lui Department of Computer Science & Engineering

Add to Reading List

Source URL: www.cs.cuhk.hk

Language: English - Date: 2005-12-14 03:04:44
    15Distributed computing / Intellectual property law / Peer-to-peer computing / BitTorrent / Peer-to-peer / Cache / Social peer-to-peer processes / EigenTrust / File sharing / Computing / Concurrent computing / File sharing networks

    NetEcon 2012 Workshop -- Part of INFOCOMOn Incentivizing Caching for P2P-VoD Systems Weijie Wu , Richard T.B. Ma§+ and John C.S. Lui The Chinese University of Hong Kong § National University of Singapore

    Add to Reading List

    Source URL: www.cs.cuhk.hk

    Language: English - Date: 2012-05-09 20:41:45
    16Data analysis / Data mining / Geostatistics / Machine learning / Markov chain / Peer-to-peer / Connection / Statistics / Multivariate statistics / Cluster analysis

    On Modeling Clustering Indexes of BT-like Systems Q.H. Li John C.S. Lui The Chinese University of Hong Kong Abstract—In this paper, we explore the “clustering” phenomenon in BT-like systems. A high clustering impli

    Add to Reading List

    Source URL: www.cs.cuhk.hk

    Language: English - Date: 2008-12-29 20:25:20
    17Telecommunications engineering / Information / Finite fields / Network coding / Wireless sensor network / Throughput / Spectral efficiency / Coding gain / Huffman coding / Network performance / Information theory / Coding theory

    How Many Packets Can We Encode? — An Analysis of Practical Wireless Network Coding Jilin Le, John C.S. Lui

    Add to Reading List

    Source URL: www.cs.cuhk.hk

    Language: English - Date: 2008-06-28 23:20:51
    18Rekeying / Public-key cryptography / B-tree / Cryptography / Cryptographic protocols / Locksmithing

    SEAL: A Secure Communication Library for Building Dynamic Group Key Agreement Applications ? Patrick P. C. Lee a John C. S. Lui b David K. Y. Yau c a Department of Computer Science, Columbia University, New York, NY 100

    Add to Reading List

    Source URL: www.cs.cuhk.hk

    Language: English - Date: 2006-04-23 21:23:04
    19Telecommunications engineering / Information / Finite fields / Network coding / Wireless sensor network / Throughput / Spectral efficiency / Coding gain / Joint / Network performance / Information theory / Coding theory

    1 On the Performance Bounds of Practical Wireless Network Coding Jilin Le∗ , John C.S. Lui∗ and Dah Ming Chiu+ The Chinese University of Hong Kong

    Add to Reading List

    Source URL: www.cs.cuhk.hk

    Language: English - Date: 2009-12-22 01:23:54
    20Spamming / Botnets / Denial-of-service attacks / Internet Relay Chat / Android Cloud to Device Messaging Service / Denial-of-service attack / Push technology / Malware / Windows Mobile / Computing / Computer network security / Multi-agent systems

    Cloud-based Push-Styled Mobile Botnets: A Case Study of Exploiting the Cloud to Device Messaging Service Shuang Zhao Patrick P.C. Lee John C.S. Lui Xiaohong Guan Xiaobo Ma Jing Tao

    Add to Reading List

    Source URL: www.cs.cuhk.hk

    Language: English - Date: 2012-08-15 23:52:07
    UPDATE