Wun-She Yap
TitleCited byYear
An efficient certificateless signature scheme
WS Yap, SH Heng, BM Goi
International Conference on Embedded and Ubiquitous Computing, 322-331, 2006
1562006
Cryptanalysis of a new image alternate encryption algorithm based on chaotic map
WS Yap, RCW Phan, WC Yau, SH Heng
Nonlinear Dynamics 80 (3), 1483-1491, 2015
412015
Security mediated certificateless signatures
WS Yap, SSM Chow, SH Heng, BM Goi
International Conference on Applied Cryptography and Network Security, 459-477, 2007
412007
Cancellable iris template generation based on Indexing-First-One hashing
YL Lai, Z Jin, ABJ Teoh, BM Goi, WS Yap, TY Chai, C Rathgeb
Pattern Recognition 64, 105-117, 2017
332017
Implementation of searchable symmetric encryption for privacy-preserving keyword search on cloud storage
MI Salam, WC Yau, JJ Chin, SH Heng, HC Ling, RCW Phan, GS Poh, ...
Human-centric Computing and Information Sciences 5 (1), 19, 2015
332015
Certificateless Ring Signatures.
SSM Chow, WS Yap
IACR Cryptology ePrint Archive 2007, 236, 2007
292007
Comments on" analysis and improvement of a secure and efficient handover authentication based on bilinear pairing functions"
SL Yeo, WS Yap, JK Liu, M Henricksen
IEEE Communications Letters 17 (8), 1521-1523, 2013
272013
Cryptanalysis of some proxy signature schemes without certificates
WS Yap, SH Heng, BM Goi
IFIP International Workshop on Information Security Theory and Practices …, 2007
222007
Weak keys of the full MISTY1 block cipher for related-key differential cryptanalysis
J Lu, WS Yap, Y Wei
Cryptographers’ Track at the RSA Conference, 389-404, 2013
12*2013
Side-channel analysis of the K2 stream cipher
M Henricksen, WS Yap, CH Yian, S Kiyomoto, T Tanaka
Australasian Conference on Information Security and Privacy, 53-73, 2010
112010
Improved cryptanalysis of the common scrambling algorithm stream cipher
L Simpson, M Henricksen, WS Yap
Australasian Conference on Information Security and Privacy, 108-121, 2009
112009
On the effective subkey space of some image encryption algorithms using external key
WS Yap, RCW Phan, BM Goi, WC Yau, SH Heng
Journal of Visual Communication and Image Representation 40, 51-57, 2016
102016
SPRING: a novel parallel chaos-based image encryption scheme
WK Lee, RCW Phan, WS Yap, BM Goi
Nonlinear Dynamics 92 (2), 575-593, 2018
82018
Cryptanalysis of a high-definition image encryption based on AES modification
WS Yap, RCW Phan, BM Goi
Wireless Personal Communications 88 (3), 685-699, 2016
62016
Security analysis of GCM for communication
WS Yap, SL Yeo, SH Heng, M Henricksen
Security and Communication Networks 7 (5), 854-864, 2014
62014
Cancellable speech template via random binary orthogonal matrices projection hashing
KY Chee, Z Jin, D Cai, M Li, WS Yap, YL Lai, BM Goi
Pattern Recognition 76, 273-287, 2018
52018
Commentary on “A block chaotic image encryption scheme based on self-adaptive modelling”[Applied Soft Computing 22 (2014) 351–357]
WS Yap, RCW Phan
Applied Soft Computing 52, 501-504, 2017
52017
Iris Cancellable Template Generation Based on Indexing-First-One Hashing
YL Lai, Z Jin, BM Goi, TY Chai, WS Yap
International Conference on Network and System Security, 450-463, 2016
42016
On the security of a lightweight authentication and encryption scheme for mobile ad hoc network
WS Yap, JK Liu, SY Tan, BM Goi
Security and Communication Networks 8 (17), 3094-3098, 2015
42015
MASHA–Low Cost Authentication with a New Stream Cipher
S Kiyomoto, M Henricksen, WS Yap, Y Nakano, K Fukushima
International Conference on Information Security, 63-78, 2011
42011
The system can't perform the operation now. Try again later.
Articles 1–20