Wei-Chuen Yau

Orcid: 0000-0003-4059-6358

According to our database1, Wei-Chuen Yau authored at least 38 papers between 2007 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
E-WebGuard: Enhanced neural architectures for precision web attack detection.
Comput. Secur., 2025

2024
DSteganoM: Deep steganography for motion capture data.
Expert Syst. Appl., March, 2024

2023
Differential fault attacks on the lightweight authenticated encryption algorithm CLX-128.
J. Cryptogr. Eng., September, 2023

Online/Offline Rewritable Blockchain With Auditable Outsourced Computation.
IEEE Trans. Cloud Comput., 2023

3D SOC-Net: Deep 3D reconstruction network based on self-organizing clustering mapping.
Expert Syst. Appl., 2023

2022
Trapdoor Privacy in Public Key Encryption With Keyword Search: A Review.
IEEE Access, 2022

One-Time Rewritable Blockchain with Traitor Tracing and Bilateral Access Control.
Proceedings of the IEEE International Conference on Trust, 2022

2021
An Implementation Suite for a Hybrid Public Key Infrastructure.
Symmetry, 2021

Automated leather defect inspection using statistical approach on image intensity.
J. Ambient Intell. Humaniz. Comput., 2021

Cube Attacks on Round-Reduced TinyJAMBU.
IACR Cryptol. ePrint Arch., 2021

Integrated Churn Prediction and Customer Segmentation Framework for Telco Business.
IEEE Access, 2021

Random Differential Fault Attacks on the Lightweight Authenticated Encryption Stream Cipher Grain-128AEAD.
IEEE Access, 2021

TABE-DAC: Efficient Traceable Attribute-Based Encryption Scheme With Dynamic Access Control Based on Blockchain.
IEEE Access, 2021

Learning Age From Gait: A Survey.
IEEE Access, 2021

2020
Information hiding in motion data of virtual characters.
Expert Syst. Appl., 2020

A Decryptable Attribute-Based Keyword Search Scheme on eHealth Cloud in Internet of Things Platforms.
IEEE Access, 2020

Differential Fault Based Key Recovery Attacks on TRIAD.
Proceedings of the Information Security and Cryptology - ICISC 2020, 2020

2019
Efficient Hierarchical Identity-Based Encryption System for Internet of Things Infrastructure.
Symmetry, 2019

OFF-ApexNet on micro-expression recognition system.
Signal Process. Image Commun., 2019

Integrated Neural Network and Machine Vision Approach For Leather Defect Classification.
CoRR, 2019

2017
Searchable Symmetric Encryption: Designs and Challenges.
ACM Comput. Surv., 2017

2016
On the effective subkey space of some image encryption algorithms using external key.
J. Vis. Commun. Image Represent., 2016

2015
An implementation of enhanced public key infrastructure.
Multim. Tools Appl., 2015

Efficient Secure-Channel Free Public Key Encryption with Keyword Search for EMRs in Cloud Storage.
J. Medical Syst., 2015

Implementation of searchable symmetric encryption for privacy-preserving keyword search on cloud storage.
Hum. centric Comput. Inf. Sci., 2015

A Client-Server Prototype of a Symmetric Key Searchable Encryption Scheme Using Open-Source Applications.
Proceedings of the 5th International Conference on IT Convergence and Security, 2015

2013
Security Analysis of a Chaotic Map-based Authentication Scheme for Telecare Medicine Information Systems.
J. Medical Syst., 2013

Keyword guessing attacks on secure searchable public key encryption schemes with a designated tester.
Int. J. Comput. Math., 2013

An Enhanced Public Key Infrastructure.
Proceedings of the 2013 International Conference on IT Convergence and Security, 2013

2012
Efficient encryption with keyword search in mobile networks.
Secur. Commun. Networks, 2012

Security models for delegated keyword searching within encrypted contents.
J. Internet Serv. Appl., 2012

Email Encryption System Using Certificateless Public Key Encryption Scheme.
Proceedings of the Information Technology Convergence, Secure and Trust Computing, and Data Management, 2012

2011
Cryptanalysis of a Provably Secure Cross-Realm Client-to-Client Password-Authenticated Key Agreement Protocol of CANS '09.
Proceedings of the Cryptology and Network Security - 10th International Conference, 2011

2010
Proxy Re-encryption with Keyword Search: New Definitions and Algorithms.
Proceedings of the Security Technology, Disaster Recovery and Business Continuity, 2010

2009
Analysis of Two Pairing-Based Three-Party Password Authenticated Key Exchange Protocols.
Proceedings of the Third International Conference on Network and System Security, 2009

2008
Cryptanalysis of simple three-party key exchange protocol (S-3PAKE).
Inf. Sci., 2008

Off-Line Keyword Guessing Attacks on Recent Public Key Encryption with Keyword Search Schemes.
Proceedings of the Autonomic and Trusted Computing, 5th International Conference, 2008

2007
Security Analysis of TORA Routing Protocol.
Proceedings of the Computational Science and Its Applications, 2007


  Loading...