Wei-Chuen Yau
Wei-Chuen Yau
Xiamen University Malaysia
Verified email at xmu.edu.my
TitleCited byYear
Cryptanalysis of simple three-party key exchange protocol (S-3PAKE)
RCW Phan, WC Yau, BM Goi
Information sciences 178 (13), 2849-2856, 2008
872008
Off-line keyword guessing attacks on recent public key encryption with keyword search schemes
WC Yau, SH Heng, BM Goi
International Conference on Autonomic and Trusted Computing, 100-105, 2008
832008
Design and Implementation of an XML Firewall
YS Loh, WC Yau, CT Wong, WC Ho
2006 International Conference on Computational Intelligence and Security 2 …, 2006
482006
Searchable symmetric encryption: designs and challenges
GS Poh, JJ Chin, WC Yau, KKR Choo, MS Mohamad
ACM Computing Surveys (CSUR) 50 (3), 40, 2017
462017
Cryptanalysis of a new image alternate encryption algorithm based on chaotic map
WS Yap, RCW Phan, WC Yau, SH Heng
Nonlinear Dynamics 80 (3), 1483-1491, 2015
412015
Implementation of searchable symmetric encryption for privacy-preserving keyword search on cloud storage
MI Salam, WC Yau, JJ Chin, SH Heng, HC Ling, RCW Phan, GS Poh, ...
Human-centric Computing and Information Sciences 5 (1), 19, 2015
332015
Efficient secure-channel free public key encryption with keyword search for EMRs in cloud storage
L Guo, WC Yau
Journal of medical systems 39 (2), 11, 2015
332015
Keyword guessing attacks on secure searchable public key encryption schemes with a designated tester
WC Yau, RCW Phan, SH Heng, BM Goi
International Journal of Computer Mathematics 90 (12), 2581-2587, 2013
322013
Proxy re-encryption with keyword search: new definitions and algorithms
WC Yau, RCW Phan, SH Heng, BM Goi
Security Technology, Disaster Recovery and Business Continuity, 149-160, 2010
312010
Security analysis of a chaotic map-based authentication scheme for telecare medicine information systems
WC Yau, RCW Phan
Journal of medical systems 37 (6), 9993, 2013
232013
On the effective subkey space of some image encryption algorithms using external key
WS Yap, RCW Phan, BM Goi, WC Yau, SH Heng
Journal of Visual Communication and Image Representation 40, 51-57, 2016
102016
Cryptanalysis of a chaotic map-based password-authenticated key agreement protocol using smart cards
WC Yau, RCW Phan
Nonlinear Dynamics 79 (2), 809-821, 2015
72015
Cryptanalysis of a provably secure cross-realm client-to-client password-authenticated key agreement protocol of CANS’09
WC Yau, RCW Phan, BM Goi, SH Heng
International Conference on Cryptology and Network Security, 172-184, 2011
72011
Proxy re-encryption with keyword search: New definitions and algorithms with proofs
WC Yau, RCW Phan, SH Heng, BM Goi
International Journal of Security and Its Applications 5 (2), 75-90, 2011
72011
OFF-ApexNet on Micro-expression Recognition System
ST Liong, YS Gan, WC Yau, YC Huang, TL Ken
arXiv preprint arXiv:1805.08699, 2018
52018
Security analysis of TORA routing protocol
VL Chee, WC Yau
International Conference on Computational Science and Its Applications, 975-986, 2007
52007
OFF-ApexNet on micro-expression recognition system
YS Gan, ST Liong, WC Yau, YC Huang, LK Tan
Signal Processing: Image Communication 74, 129-139, 2019
42019
Security models for delegated keyword searching within encrypted contents
WC Yau, RCW Phan, SH Heng, BM Goi
Journal of Internet Services and Applications 3 (2), 233-241, 2012
42012
Analysis of two pairing-based three-party password authenticated key exchange protocols
RCW Phan, WC Yau, BM Goi
2009 Third International Conference on Network and System Security, 102-106, 2009
42009
A client-server prototype of a symmetric key searchable encryption scheme using open-source applications
SY Tan, JJ Chin, GS Poh, YHS Kam, WC Yau
2015 5th International Conference on IT Convergence and Security (ICITCS), 1-5, 2015
22015
The system can't perform the operation now. Try again later.
Articles 1–20