Z.C. Li, L. Hui, K.P. Chow, W.W. Tsang, C.F. Chong, and H.W. Chan, Cryptanalysis of Harn digital multisignature scheme with distinguished signing authorities, Electronic Letters, February 2000
Z.C. Li, L. Hui, K.P. Chow, W.W. Tsang, C.F. Chong, and H.W. Chan, Security of Tseng-Jan’s group signature schemes, Information Processing Letter, 75(5): 187-189
Z.C. Li, L. Hui, K.P. Chow, W.W. Tsang, C.F. Chong, and H.W. Chan, Security of Wang et al.’s group-oriented threshold signature schemes with traceable signers, Information Processing Letter, 80(6): 295-298, December 2001
K.H. Pun, L. Hui, K.P. Chow, W.W. Tsang, C.F. Chong, and H.W. Chan, Review of the Electronic Transactions Ordinance: Can the Personal Identification Number Replace the Digital Signature?, Hong Kong Law Journal, 32(2): 241-257, 2002
L. Hui, K.P. Chow, K.H. Pun, W.W. Tsang, C.F. Chong, and H.W. Chan, Cyber Forensics, Company Secretary, 12(7): 43-47, 2002
M. Kwan, R. Overill, K.P. Chow, J. Silomon, H. Tse, F. Law, P. Lai, Internet Auction Fraud Investigations, Sixth IFIP WG 11.9 International Confernece on Digital Forensics, Hong Kong, 2010
R. Ieong, P. Lai, K.P. Chow, M. Kwan, F. Law, Is it an Initial Seeder? Derived Rules that Indicate a Seeder is within the Slow-Rising Period, Sixth IFIP WG 11.9 International Confernece on Digital Forensics, Hong Kong, 2010
F. Xu, K.P. Chow, J.He, W. Xu, Privacy Reference Monitor - A Computer Model for Law Compliant Privacy Protection, 2009 IEEE International Conference on Parallel and Distributed Systems, China, 2009.
R. Ieong, P. Lai, K.P. Chow, M. Kwan, F. Law, HTse, K. Tse, Forensic Investigation of Peer-to-Peer Networks, Handbook of Research on Computational Forensics, Digital Crime and Investigation: Methods and Solutions, IGI Global, UK