Name
Playground
About
FAQ
GitHub
Playground
Shortest Path Finder
Community Detector
Connected Papers
Author Trending
Leonie Diffley
Daniel P. Kennedy
Dan Graur
Barbara Aquilani
S. Phillips
Eun-Hee Goo
Maximilian Dürr
Jhonathan Pinzon
Liangliang Shang
Chen Ma
Home
/
Author
/
WEI-CHUEN YAU
Author Info
Open Visualization
Name
Affiliation
Papers
WEI-CHUEN YAU
Faculty of Engineering, Multimedia University, Jalan Multimedia, 63100, Cyberjaya, Selangor Darul EhsanMalaysia
23
Collaborators
Citations
PageRank
28
264
11.99
Referers
Referees
References
612
934
483
Search Limit
100
934
Publications (23 rows)
Collaborators (28 rows)
Referers (100 rows)
Referees (100 rows)
Title
Citations
PageRank
Year
An Implementation Suite For A Hybrid Public Key Infrastructure
0
0.34
2021
Automated leather defect inspection using statistical approach on image intensity
0
0.34
2021
A Decryptable Attribute-Based Keyword Search Scheme on eHealth Cloud in Internet of Things Platforms
0
0.34
2020
Efficient Hierarchical Identity-Based Encryption System for Internet of Things Infrastructure.
1
0.36
2019
Integrated Neural Network and Machine Vision Approach For Leather Defect Classification.
1
0.35
2019
OFF-ApexNet on Micro-expression Recognition System.
1
0.35
2018
Searchable Symmetric Encryption: Designs and Challenges
22
0.80
2017
On the effective subkey space of some image encryption algorithms using external key.
2
0.38
2016
A Client-Server Prototype of a Symmetric Key Searchable Encryption Scheme Using Open-Source Applications
1
0.35
2015
Efficient Secure-Channel Free Public Key Encryption with Keyword Search for EMRs in Cloud Storage
23
0.53
2015
An implementation of enhanced public key infrastructure.
0
0.34
2015
Implementation of searchable symmetric encryption for privacy-preserving keyword search on cloud storage
5
0.57
2015
Security analysis of a chaotic map-based authentication scheme for telecare medicine information systems.
100
0.98
2013
Keyword guessing attacks on secure searchable public key encryption schemes with a designated tester
12
0.57
2013
Email Encryption System Using Certificateless Public Key Encryption Scheme
0
0.34
2012
Security models for delegated keyword searching within encrypted contents.
3
0.39
2012
Efficient encryption with keyword search in mobile networks
1
0.38
2012
Cryptanalysis of a provably secure cross-realm client-to-client password-authenticated key agreement protocol of CANS '09
2
0.40
2011
Proxy Re-encryption with Keyword Search: New Definitions and Algorithms.
10
0.54
2010
Analysis of Two Pairing-Based Three-Party Password Authenticated Key Exchange Protocols
1
0.39
2009
Cryptanalysis of simple three-party key exchange protocol (S-3PAKE)
40
1.31
2008
Off-Line Keyword Guessing Attacks on Recent Public Key Encryption with Keyword Search Schemes
39
1.32
2008
Security analysis of TORA routing protocol
0
0.34
2007
1