An efficient certificateless signature scheme WS Yap, SH Heng, BM Goi International Conference on Embedded and Ubiquitous Computing, 322-331, 2006 | 178 | 2006 |
Cancellable iris template generation based on Indexing-First-One hashing YL Lai, Z Jin, ABJ Teoh, BM Goi, WS Yap, TY Chai, C Rathgeb Pattern Recognition 64, 105-117, 2017 | 86 | 2017 |
Cryptanalysis of a new image alternate encryption algorithm based on chaotic map WS Yap, RCW Phan, WC Yau, SH Heng Nonlinear Dynamics 80 (3), 1483-1491, 2015 | 62 | 2015 |
Security mediated certificateless signatures WS Yap, SSM Chow, SH Heng, BM Goi International Conference on Applied Cryptography and Network Security, 459-477, 2007 | 54 | 2007 |
Implementation of searchable symmetric encryption for privacy-preserving keyword search on cloud storage MI Salam, WC Yau, JJ Chin, SH Heng, HC Ling, RCW Phan, GS Poh, ... Human-centric Computing and Information Sciences 5 (1), 1-16, 2015 | 51 | 2015 |
SPRING: a novel parallel chaos-based image encryption scheme WK Lee, RCW Phan, WS Yap, BM Goi Nonlinear Dynamics 92 (2), 575-593, 2018 | 41 | 2018 |
Ethnic differences in anthropometry among adult Singaporean Chinese, Malays and Indians, and their effects on lung volumes WS Yap, CC Chan, SP Chan Respiratory medicine 95 (4), 297-304, 2001 | 40 | 2001 |
Certificateless ring signatures SSM Chow, WS Yap Cryptology ePrint Archive, 2007 | 38 | 2007 |
Comments on" analysis and improvement of a secure and efficient handover authentication based on bilinear pairing functions" SL Yeo, WS Yap, JK Liu, M Henricksen IEEE Communications Letters 17 (8), 1521-1523, 2013 | 31 | 2013 |
An alignment-free cancelable fingerprint template for bio-cryptosystems B Alam, Z Jin, WS Yap, BM Goi Journal of Network and Computer Applications 115, 20-32, 2018 | 25 | 2018 |
Cryptanalysis of some proxy signature schemes without certificates WS Yap, SH Heng, BM Goi IFIP International Workshop on Information Security Theory and Practices …, 2007 | 25 | 2007 |
A Calibrated, Watershed-Specific SCS-CN Method: Application to Wangjiaqiao Watershed in the Three Gorges Area, China L Ling, Z Yusop, WS Yap, WL Tan, MF Chow, JL Ling Water 12 (1), 60, 2019 | 18 | 2019 |
Cancellable speech template via random binary orthogonal matrices projection hashing KY Chee, Z Jin, D Cai, M Li, WS Yap, YL Lai, BM Goi Pattern Recognition 76, 273-287, 2018 | 18 | 2018 |
An image encryption scheme based on public key cryptosystem and quantum logistic map G Ye, K Jiao, X Huang, BM Goi, WS Yap Scientific Reports 10 (1), 1-19, 2020 | 17 | 2020 |
Hierarchical gated recurrent neural network with adversarial and virtual adversarial training on text classification HK Poon, WS Yap, YK Tee, WK Lee, BM Goi Neural Networks 119, 299-312, 2019 | 17 | 2019 |
On the effective subkey space of some image encryption algorithms using external key WS Yap, RCW Phan, BM Goi, WC Yau, SH Heng Journal of Visual Communication and Image Representation 40, 51-57, 2016 | 15 | 2016 |
Weak keys of the full MISTY1 block cipher for related-key differential cryptanalysis J Lu, WS Yap, Y Wei Cryptographers’ Track at the RSA Conference, 389-404, 2013 | 15* | 2013 |
Side-channel analysis of the K2 stream cipher M Henricksen, WS Yap, CH Yian, S Kiyomoto, T Tanaka Australasian Conference on Information Security and Privacy, 53-73, 2010 | 15 | 2010 |
Improved cryptanalysis of the common scrambling algorithm stream cipher L Simpson, M Henricksen, WS Yap Australasian Conference on Information Security and Privacy, 108-121, 2009 | 15 | 2009 |
Accelerating number theoretic transform in gpu platform for qtesla scheme WK Lee, S Akleylek, WS Yap, BM Goi International Conference on Information Security Practice and Experience, 41-55, 2019 | 10 | 2019 |