Wun-She Yap

According to our database1, Wun-She Yap authored at least 42 papers between 2006 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepage:

On csauthors.net:

Bibliography

2019
Hierarchical gated recurrent neural network with adversarial and virtual adversarial training on text classification.
Neural Networks, 2019

Accelerating Number Theoretic Transform in GPU Platform for qTESLA Scheme.
Proceedings of the Information Security Practice and Experience, 2019

2018
Cancellable speech template via random binary orthogonal matrices projection hashing.
Pattern Recognition, 2018

An alignment-free cancelable fingerprint template for bio-cryptosystems.
J. Network and Computer Applications, 2018

Weak keys of the full MISTY1 block cipher for related-key amplified boomerang cryptanalysis.
IET Information Security, 2018

Security analysis of M-DES and key-based coded permutation ciphers in wireless channels.
IET Communications, 2018

Fast NTRU Encryption in GPU for Secure IoP Communication in Post-Quantum Era.
Proceedings of the 2018 IEEE SmartWorld, 2018

Convolutional Neural Network-Based Collaborative Filtering for Recommendation Systems.
Proceedings of the Robot Intelligence Technology and Applications, 2018

Hierarchical Attention Networks for Different Types of Documents with Smaller Size of Datasets.
Proceedings of the Robot Intelligence Technology and Applications, 2018

Document level polarity classification with attention gated recurrent unit.
Proceedings of the 2018 International Conference on Information Networking, 2018

2017
Improved Path Loss Simulation Incorporating Three-Dimensional Terrain Model Using Parallel Coprocessors.
Wireless Communications and Mobile Computing, 2017

Cancellable iris template generation based on Indexing-First-One hashing.
Pattern Recognition, 2017

Data privacy preserving scheme using generalised linear models.
Computers & Security, 2017

Commentary on "A block chaotic image encryption scheme based on self-adaptive modelling" [Applied Soft Computing 22 (2014) 351-357].
Appl. Soft Comput., 2017

Two-dimensional winner-takes-all hashing in template protection based on fingerprint and voice feature level fusion.
Proceedings of the 2017 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2017

2016
Cryptanalysis of a High-Definition Image Encryption Based on AES Modification.
Wireless Personal Communications, 2016

On the effective subkey space of some image encryption algorithms using external key.
J. Visual Communication and Image Representation, 2016

Cryptanalysis of a CP-ABE scheme with policy in normal forms.
Inf. Process. Lett., 2016

Forgery attacks of an identity-based multi-proxy signature scheme.
Int. J. Communication Systems, 2016

Faulty Instantiations of Threshold Ring Signature from Threshold Proof-of-Knowledge Protocol.
Comput. J., 2016

Iris Cancellable Template Generation Based on Indexing-First-One Hashing.
Proceedings of the Network and System Security - 10th International Conference, 2016

Statistical Disclosure Control for Data Privacy Using Sequence of Generalised Linear Models.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

2015
On the security of a lightweight authentication and encryption scheme for mobile ad hoc network.
Security and Communication Networks, 2015

An improved preimage attack against HAVAL-3.
Inf. Process. Lett., 2015

Implementation of searchable symmetric encryption for privacy-preserving keyword search on cloud storage.
HCIS, 2015

2014
Parallelizable MAC revisited.
Security and Communication Networks, 2014

Security analysis of GCM for communication.
Security and Communication Networks, 2014

Differential attack on nine rounds of the SEED block cipher.
Inf. Process. Lett., 2014

2013
Comments on "Analysis and Improvement of a Secure and Efficient Handover Authentication Based on Bilinear Pairing Functions".
IEEE Communications Letters, 2013

Weak Keys of the Full MISTY1 Block Cipher for Related-Key Differential Cryptanalysis.
Proceedings of the Topics in Cryptology - CT-RSA 2013, 2013

2012
Weak Keys of the Full MISTY1 Block Cipher for Related-Key Cryptanalysis.
IACR Cryptology ePrint Archive, 2012

2011
MASHA - Low Cost Authentication with a New Stream Cipher.
Proceedings of the Information Security, 14th International Conference, 2011

Cryptanalysis of the full CHAIN cipher.
Proceedings of the 7th International Conference on Information Assurance and Security, 2011

2010
Side-Channel Analysis of the K2 Stream Cipher.
Proceedings of the Information Security and Privacy - 15th Australasian Conference, 2010

2009
Partial decryption attacks in security-mediated certificateless encryption.
IET Information Security, 2009

Improved Cryptanalysis of the Common Scrambling Algorithm Stream Cipher.
Proceedings of the Information Security and Privacy, 14th Australasian Conference, 2009

2008
On the Security of an Identity-Based Aggregate Signature Scheme.
Proceedings of the 22nd International Conference on Advanced Information Networking and Applications, 2008

2007
Certificateless Ring Signatures.
IACR Cryptology ePrint Archive, 2007

Cryptanalysis of Some Proxy Signature Schemes Without Certificates.
Proceedings of the Information Security Theory and Practices. Smart Cards, 2007

Linkability of Some Blind Signature Schemes.
Proceedings of the Information Security Theory and Practices. Smart Cards, 2007

Security Mediated Certificateless Signatures.
Proceedings of the Applied Cryptography and Network Security, 5th International Conference, 2007

2006
An Efficient Certificateless Signature Scheme.
Proceedings of the Emerging Directions in Embedded and Ubiquitous Computing, 2006


  Loading...