Global

Business & Management Experts

Dr. K.p. Chow

Associate Professor
computer science
University of Hong Kong
Hong Kong

Biography

Dr. Chow began his academic career in this department upon completion of his doctoral degree in the United States. His first contribution was on establishing HARNET, the first academic and research network for tertiary institutions in Hong Kong (with Raymond Loand Dr. Ng). His earlier research works were in expert systems development and Chinese computing

Research Interest

Computer Forensics, Digital Investigation, Data Privacy, Cryptography, Computer Security

Publications

  • Z.C. Li, L. Hui, K.P. Chow, W.W. Tsang, C.F. Chong, and H.W. Chan, Cryptanalysis of Harn digital multisignature scheme with distinguished signing authorities, Electronic Letters, February 2000

  • Z.C. Li, L. Hui, K.P. Chow, W.W. Tsang, C.F. Chong, and H.W. Chan, Security of Tseng-Jan’s group signature schemes, Information Processing Letter, 75(5): 187-189

  • Z.C. Li, L. Hui, K.P. Chow, W.W. Tsang, C.F. Chong, and H.W. Chan, Security of Wang et al.’s group-oriented threshold signature schemes with traceable signers, Information Processing Letter, 80(6): 295-298, December 2001

  • K.H. Pun, L. Hui, K.P. Chow, W.W. Tsang, C.F. Chong, and H.W. Chan, Review of the Electronic Transactions Ordinance: Can the Personal Identification Number Replace the Digital Signature?, Hong Kong Law Journal, 32(2): 241-257, 2002

  • L. Hui, K.P. Chow, K.H. Pun, W.W. Tsang, C.F. Chong, and H.W. Chan, Cyber Forensics, Company Secretary, 12(7): 43-47, 2002

  • M. Kwan, R. Overill, K.P. Chow, J. Silomon, H. Tse, F. Law, P. Lai, Internet Auction Fraud Investigations, Sixth IFIP WG 11.9 International Confernece on Digital Forensics, Hong Kong, 2010

  • R. Ieong, P. Lai, K.P. Chow, M. Kwan, F. Law, Is it an Initial Seeder? Derived Rules that Indicate a Seeder is within the Slow-Rising Period, Sixth IFIP WG 11.9 International Confernece on Digital Forensics, Hong Kong, 2010

  • F. Xu, K.P. Chow, J.He, W. Xu, Privacy Reference Monitor - A Computer Model for Law Compliant Privacy Protection, 2009 IEEE International Conference on Parallel and Distributed Systems, China, 2009.

  • R. Ieong, P. Lai, K.P. Chow, M. Kwan, F. Law, HTse, K. Tse, Forensic Investigation of Peer-to-Peer Networks, Handbook of Research on Computational Forensics, Digital Crime and Investigation: Methods and Solutions, IGI Global, UK

Global Experts from Hong Kong

Global Experts in Subject

Share This Profile
Recent Expert Updates
  • Matthew L Stone
    Matthew L Stone
    pediatrics
    University of Virginia Health System; Charlottesville, VA
    United States of America
  • Dr.   Matthew
    Dr. Matthew
    pediatrics
    University of Virginia Health System; Charlottesville, VA
    United States of America
  • Dr.  L Stone Matthew
    Dr. L Stone Matthew
    pediatrics
    University of Virginia Health System; Charlottesville, VA
    United States of America
  • Dr.  L Stone
    Dr. L Stone
    pediatrics
    University of Virginia Health System; Charlottesville, VA
    United States of America
  • Dr. Matthew L Stone
    Dr. Matthew L Stone
    pediatrics
    University of Virginia Health System; Charlottesville, VA
    United States of America
  • Dr.  R Sameh
    Dr. R Sameh
    pediatrics
    King Abdul Aziz University
    United Arab Emirates
  • Dr.   R Ismail,
    Dr. R Ismail,
    pediatrics
    King Abdul Aziz University
    United Arab Emirates
  • Sameh R Ismail,
    Sameh R Ismail,
    pediatrics
    King Abdul Aziz University
    United Arab Emirates
  • Dr.   Sameh R Ismail,
    Dr. Sameh R Ismail,
    pediatrics
    King Abdul Aziz University
    United Arab Emirates
  • Dr.   William
    Dr. William
    pediatrics
    Maimonides Medical Center
    United States of America