An efficient certificateless signature scheme WS Yap, SH Heng, BM Goi International Conference on Embedded and Ubiquitous Computing, 322-331, 2006 | 174 | 2006 |
Cancellable iris template generation based on Indexing-First-One hashing YL Lai, Z Jin, ABJ Teoh, BM Goi, WS Yap, TY Chai, C Rathgeb Pattern Recognition 64, 105-117, 2017 | 62 | 2017 |
Cryptanalysis of a new image alternate encryption algorithm based on chaotic map WS Yap, RCW Phan, WC Yau, SH Heng Nonlinear Dynamics 80 (3), 1483-1491, 2015 | 58 | 2015 |
Security mediated certificateless signatures WS Yap, SSM Chow, SH Heng, BM Goi International Conference on Applied Cryptography and Network Security, 459-477, 2007 | 50 | 2007 |
Implementation of searchable symmetric encryption for privacy-preserving keyword search on cloud storage MI Salam, WC Yau, JJ Chin, SH Heng, HC Ling, RCW Phan, GS Poh, ... Human-centric Computing and Information Sciences 5 (1), 1-16, 2015 | 45 | 2015 |
Certificateless Ring Signatures. SSM Chow, WS Yap IACR Cryptol. ePrint Arch. 2007, 236, 2007 | 34 | 2007 |
Comments on" analysis and improvement of a secure and efficient handover authentication based on bilinear pairing functions" SL Yeo, WS Yap, JK Liu, M Henricksen IEEE Communications Letters 17 (8), 1521-1523, 2013 | 27 | 2013 |
SPRING: a novel parallel chaos-based image encryption scheme WK Lee, RCW Phan, WS Yap, BM Goi Nonlinear Dynamics 92 (2), 575-593, 2018 | 25 | 2018 |
Cryptanalysis of some proxy signature schemes without certificates WS Yap, SH Heng, BM Goi IFIP International Workshop on Information Security Theory and Practices …, 2007 | 22 | 2007 |
An alignment-free cancelable fingerprint template for bio-cryptosystems B Alam, Z Jin, WS Yap, BM Goi Journal of Network and Computer Applications 115, 20-32, 2018 | 16 | 2018 |
On the effective subkey space of some image encryption algorithms using external key WS Yap, RCW Phan, BM Goi, WC Yau, SH Heng Journal of Visual Communication and Image Representation 40, 51-57, 2016 | 14 | 2016 |
Side-channel analysis of the K2 stream cipher M Henricksen, WS Yap, CH Yian, S Kiyomoto, T Tanaka Australasian Conference on Information Security and Privacy, 53-73, 2010 | 14 | 2010 |
Weak keys of the full MISTY1 block cipher for related-key differential cryptanalysis J Lu, WS Yap, Y Wei Cryptographers’ Track at the RSA Conference, 389-404, 2013 | 13* | 2013 |
Improved cryptanalysis of the common scrambling algorithm stream cipher L Simpson, M Henricksen, WS Yap Australasian Conference on Information Security and Privacy, 108-121, 2009 | 12 | 2009 |
Cancellable speech template via random binary orthogonal matrices projection hashing KY Chee, Z Jin, D Cai, M Li, WS Yap, YL Lai, BM Goi Pattern Recognition 76, 273-287, 2018 | 11 | 2018 |
Cryptanalysis of a high-definition image encryption based on AES modification WS Yap, RCW Phan, BM Goi Wireless Personal Communications 88 (3), 685-699, 2016 | 9 | 2016 |
Commentary on “A block chaotic image encryption scheme based on self-adaptive modelling”[Applied Soft Computing 22 (2014) 351–357] WS Yap, RCW Phan Applied Soft Computing 52, 501-504, 2017 | 8 | 2017 |
A calibrated, watershed-specific SCS-CN method: Application to Wangjiaqiao Watershed in the Three Gorges Area, China L Ling, Z Yusop, WS Yap, WL Tan, MF Chow, JL Ling Water 12 (1), 60, 2020 | 7 | 2020 |
On the security of a lightweight authentication and encryption scheme for mobile ad hoc network WS Yap, JK Liu, SY Tan, BM Goi Security and Communication Networks 8 (17), 3094-3098, 2015 | 7 | 2015 |
Security analysis of GCM for communication WS Yap, SL Yeo, SH Heng, M Henricksen Security and Communication Networks 7 (5), 854-864, 2014 | 7 | 2014 |