Follow
Wun-She Yap
Title
Cited by
Cited by
Year
An efficient certificateless signature scheme
WS Yap, SH Heng, BM Goi
International Conference on Embedded and Ubiquitous Computing, 322-331, 2006
1782006
Cancellable iris template generation based on Indexing-First-One hashing
YL Lai, Z Jin, ABJ Teoh, BM Goi, WS Yap, TY Chai, C Rathgeb
Pattern Recognition 64, 105-117, 2017
862017
Cryptanalysis of a new image alternate encryption algorithm based on chaotic map
WS Yap, RCW Phan, WC Yau, SH Heng
Nonlinear Dynamics 80 (3), 1483-1491, 2015
622015
Security mediated certificateless signatures
WS Yap, SSM Chow, SH Heng, BM Goi
International Conference on Applied Cryptography and Network Security, 459-477, 2007
542007
Implementation of searchable symmetric encryption for privacy-preserving keyword search on cloud storage
MI Salam, WC Yau, JJ Chin, SH Heng, HC Ling, RCW Phan, GS Poh, ...
Human-centric Computing and Information Sciences 5 (1), 1-16, 2015
512015
SPRING: a novel parallel chaos-based image encryption scheme
WK Lee, RCW Phan, WS Yap, BM Goi
Nonlinear Dynamics 92 (2), 575-593, 2018
412018
Ethnic differences in anthropometry among adult Singaporean Chinese, Malays and Indians, and their effects on lung volumes
WS Yap, CC Chan, SP Chan
Respiratory medicine 95 (4), 297-304, 2001
402001
Certificateless ring signatures
SSM Chow, WS Yap
Cryptology ePrint Archive, 2007
382007
Comments on" analysis and improvement of a secure and efficient handover authentication based on bilinear pairing functions"
SL Yeo, WS Yap, JK Liu, M Henricksen
IEEE Communications Letters 17 (8), 1521-1523, 2013
312013
An alignment-free cancelable fingerprint template for bio-cryptosystems
B Alam, Z Jin, WS Yap, BM Goi
Journal of Network and Computer Applications 115, 20-32, 2018
252018
Cryptanalysis of some proxy signature schemes without certificates
WS Yap, SH Heng, BM Goi
IFIP International Workshop on Information Security Theory and Practices …, 2007
252007
A Calibrated, Watershed-Specific SCS-CN Method: Application to Wangjiaqiao Watershed in the Three Gorges Area, China
L Ling, Z Yusop, WS Yap, WL Tan, MF Chow, JL Ling
Water 12 (1), 60, 2019
182019
Cancellable speech template via random binary orthogonal matrices projection hashing
KY Chee, Z Jin, D Cai, M Li, WS Yap, YL Lai, BM Goi
Pattern Recognition 76, 273-287, 2018
182018
An image encryption scheme based on public key cryptosystem and quantum logistic map
G Ye, K Jiao, X Huang, BM Goi, WS Yap
Scientific Reports 10 (1), 1-19, 2020
172020
Hierarchical gated recurrent neural network with adversarial and virtual adversarial training on text classification
HK Poon, WS Yap, YK Tee, WK Lee, BM Goi
Neural Networks 119, 299-312, 2019
172019
On the effective subkey space of some image encryption algorithms using external key
WS Yap, RCW Phan, BM Goi, WC Yau, SH Heng
Journal of Visual Communication and Image Representation 40, 51-57, 2016
152016
Weak keys of the full MISTY1 block cipher for related-key differential cryptanalysis
J Lu, WS Yap, Y Wei
Cryptographers’ Track at the RSA Conference, 389-404, 2013
15*2013
Side-channel analysis of the K2 stream cipher
M Henricksen, WS Yap, CH Yian, S Kiyomoto, T Tanaka
Australasian Conference on Information Security and Privacy, 53-73, 2010
152010
Improved cryptanalysis of the common scrambling algorithm stream cipher
L Simpson, M Henricksen, WS Yap
Australasian Conference on Information Security and Privacy, 108-121, 2009
152009
Accelerating number theoretic transform in gpu platform for qtesla scheme
WK Lee, S Akleylek, WS Yap, BM Goi
International Conference on Information Security Practice and Experience, 41-55, 2019
102019
The system can't perform the operation now. Try again later.
Articles 1–20