Name
Affiliation
Papers
WEI-CHUEN YAU
Faculty of Engineering, Multimedia University, Jalan Multimedia, 63100, Cyberjaya, Selangor Darul EhsanMalaysia
23
Collaborators
Citations 
PageRank 
28
264
11.99
Referers 
Referees 
References 
612
934
483
Search Limit
100934
Title
Citations
PageRank
Year
An Implementation Suite For A Hybrid Public Key Infrastructure00.342021
Automated leather defect inspection using statistical approach on image intensity00.342021
A Decryptable Attribute-Based Keyword Search Scheme on eHealth Cloud in Internet of Things Platforms00.342020
Efficient Hierarchical Identity-Based Encryption System for Internet of Things Infrastructure.10.362019
Integrated Neural Network and Machine Vision Approach For Leather Defect Classification.10.352019
OFF-ApexNet on Micro-expression Recognition System.10.352018
Searchable Symmetric Encryption: Designs and Challenges220.802017
On the effective subkey space of some image encryption algorithms using external key.20.382016
A Client-Server Prototype of a Symmetric Key Searchable Encryption Scheme Using Open-Source Applications10.352015
Efficient Secure-Channel Free Public Key Encryption with Keyword Search for EMRs in Cloud Storage230.532015
An implementation of enhanced public key infrastructure.00.342015
Implementation of searchable symmetric encryption for privacy-preserving keyword search on cloud storage50.572015
Security analysis of a chaotic map-based authentication scheme for telecare medicine information systems.1000.982013
Keyword guessing attacks on secure searchable public key encryption schemes with a designated tester120.572013
Email Encryption System Using Certificateless Public Key Encryption Scheme00.342012
Security models for delegated keyword searching within encrypted contents.30.392012
Efficient encryption with keyword search in mobile networks10.382012
Cryptanalysis of a provably secure cross-realm client-to-client password-authenticated key agreement protocol of CANS '0920.402011
Proxy Re-encryption with Keyword Search: New Definitions and Algorithms.100.542010
Analysis of Two Pairing-Based Three-Party Password Authenticated Key Exchange Protocols10.392009
Cryptanalysis of simple three-party key exchange protocol (S-3PAKE)401.312008
Off-Line Keyword Guessing Attacks on Recent Public Key Encryption with Keyword Search Schemes391.322008
Security analysis of TORA routing protocol00.342007