Wei-Chuen Yau
Orcid: 0000-0003-4059-6358
According to our database1,
Wei-Chuen Yau
authored at least 38 papers
between 2007 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2025
Comput. Secur., 2025
2024
Expert Syst. Appl., March, 2024
2023
Differential fault attacks on the lightweight authenticated encryption algorithm CLX-128.
J. Cryptogr. Eng., September, 2023
IEEE Trans. Cloud Comput., 2023
3D SOC-Net: Deep 3D reconstruction network based on self-organizing clustering mapping.
Expert Syst. Appl., 2023
2022
IEEE Access, 2022
Proceedings of the IEEE International Conference on Trust, 2022
2021
J. Ambient Intell. Humaniz. Comput., 2021
IEEE Access, 2021
Random Differential Fault Attacks on the Lightweight Authenticated Encryption Stream Cipher Grain-128AEAD.
IEEE Access, 2021
TABE-DAC: Efficient Traceable Attribute-Based Encryption Scheme With Dynamic Access Control Based on Blockchain.
IEEE Access, 2021
2020
A Decryptable Attribute-Based Keyword Search Scheme on eHealth Cloud in Internet of Things Platforms.
IEEE Access, 2020
Proceedings of the Information Security and Cryptology - ICISC 2020, 2020
2019
Efficient Hierarchical Identity-Based Encryption System for Internet of Things Infrastructure.
Symmetry, 2019
Signal Process. Image Commun., 2019
Integrated Neural Network and Machine Vision Approach For Leather Defect Classification.
CoRR, 2019
2017
2016
On the effective subkey space of some image encryption algorithms using external key.
J. Vis. Commun. Image Represent., 2016
2015
Efficient Secure-Channel Free Public Key Encryption with Keyword Search for EMRs in Cloud Storage.
J. Medical Syst., 2015
Implementation of searchable symmetric encryption for privacy-preserving keyword search on cloud storage.
Hum. centric Comput. Inf. Sci., 2015
A Client-Server Prototype of a Symmetric Key Searchable Encryption Scheme Using Open-Source Applications.
Proceedings of the 5th International Conference on IT Convergence and Security, 2015
2013
Security Analysis of a Chaotic Map-based Authentication Scheme for Telecare Medicine Information Systems.
J. Medical Syst., 2013
Keyword guessing attacks on secure searchable public key encryption schemes with a designated tester.
Int. J. Comput. Math., 2013
Proceedings of the 2013 International Conference on IT Convergence and Security, 2013
2012
Secur. Commun. Networks, 2012
J. Internet Serv. Appl., 2012
Proceedings of the Information Technology Convergence, Secure and Trust Computing, and Data Management, 2012
2011
Cryptanalysis of a Provably Secure Cross-Realm Client-to-Client Password-Authenticated Key Agreement Protocol of CANS '09.
Proceedings of the Cryptology and Network Security - 10th International Conference, 2011
2010
Proceedings of the Security Technology, Disaster Recovery and Business Continuity, 2010
2009
Analysis of Two Pairing-Based Three-Party Password Authenticated Key Exchange Protocols.
Proceedings of the Third International Conference on Network and System Security, 2009
2008
Off-Line Keyword Guessing Attacks on Recent Public Key Encryption with Keyword Search Schemes.
Proceedings of the Autonomic and Trusted Computing, 5th International Conference, 2008
2007
Proceedings of the Computational Science and Its Applications, 2007