Home


    Wun-She Yap
    Assistant Professor
    Department of Electrical and Electronic Engineering
    Lee Kong Chian Faculty of Engineering and Science
    Universiti Tunku Abdul Rahman, Sungai Long Campus, Jalan Sungai Long, Bandar Sungai Long, 43000 Kajang, Malaysia.
    Email: yapws@utar.edu.my OR wunsheyap@gmail.com


Research

Professional Activities

External Reviewer/Subreviewer: 
Journal: Journal of System and Software, International Journal of Computer Mathematics, Applied Mathematics & Information Sciences, Journal of Medical Systems, Malaysian Journal of Computer Science, Security and Communication Networks, Soft Computing, International Journal of Bifurcation and Chaos, Nonlinear Dynamics, International Journal of Machine Learning and Cybernetics, Future Generation Computer Systems, IEEE Transactions on Information Forensics and Security, Signal Processing, Pervasive and Mobile Computing, 3D Research, China Communications, Optik - International Journal For Light And Electron Optics
Conference: M2USIC 2006, ACIS 2006, Inscrypt 2007, WISA 2007, ICON 2007, WEC 2010, ASIACCS 2011, ACNS 2012, IWSEC 2012, ICISC 2012,  Futuretech 2013, PRISMS 2013, SIN 2013, UCES 2013, TENSYMP 2014, ISPEC 2014, ASIACRYPT 2014, WISA 2014, ISPACS 2014, ACSA 2015, SIN 2015, WISA 2015, ICISC 2015 

Program Committee:
2014: ProvSec
NSSCSS, LSNS


Publications

SCI/SCIE Indexed

17. Min Cherng Lee, Robin Mitra, Emmanuel Lazaridis, An-Chow Lai, Yong Kheng Goh and Wun-She Yap. "Data Privacy Preserving Scheme using Generalised Linear Models". In Elsevier Computers & Security, Volume 69, pp. 142-154, 2017.
16. Zhang Bin Loo, Poh Kit Chong, Kim Yee Lee and Wun-She Yap. "Improved Path Loss Simulation Incorporating Three-Dimensional Terrain Model Using Parallel Co-Processors". In Wiley-Hindawi Wireless Communications and Mobile Computing, Volume 2017, Article ID 5492691, 11 pages
15. Yen-Lung Lai, Zhe Jin, Andrew Beng-Jin Teoh, Bok-Min Goi, Wun-She Yap, Tong-Yuen Chai and Christian Rathgeb. "Cancellable Iris Template Generation based on Indexing-First-One Hashing". In Elsevier Pattern Recognition, Volume 64, pp. 105-117, 2017.
14. Wun-She Yap and Raphael C.-W. Phan. "Commentary on "A block chaotic image encryption scheme based on self-adaptive modelling" [Applied Soft Computing 22 (2014) 351-357]". In Elsevier Applied Soft Computing, Volume 52, pp. 501-504, 2017.
13. Wun-She Yap, Raphael C.-W. Phan,Bok-Min Goi, Wei-Chuen Yau and Swee-Huay Heng. "On the Effective Subkey Space of Some Image Encryption Algorithms using External Key". In Elsevier Journal of Visual Communication and Image Representation, Volume 40, Part A, pp. 51-57, 2016.
12. Syh-Yuan Tan and Wun-She Yap. "Cryptanalysis of a CP-ABE Scheme with Policy in Normal Forms". In Elsevier Information Processing Letters, Volume 116, Issue 7, pp. 492-495, 2016
11. Wun-She Yap, Raphael C.-W. Phan and Bok-Min Goi. "Cryptanalysis of  a High Definition Image Encryption based on AES Modification". In Springer Wireless Personal Communications, Volume 88, Issue 3, pp. 685-699, 2016.
10. Joseph K. Liu, Sze Ling Yeo, Wun-She Yap, Sherman S. M. Chow, Duncan S. Wong and Willy Susilo. "Faulty Instantiations of Threshold Ring Signature from Threshold Proof-of-Knowledge Protocol". In Oxford The Computer Journal, Volume 59, Issue 7, pp. 945-954, 2016.
9. Wun-She Yap, Raphael C.-W. Phan, Wei-Chuen Yau and Swee-Huay Heng. "Cryptanalysis of a new image alternate encryption algorithm based on chaotic map". In Springer Nonlinear Dynamics, Volume 80, Issue 3, pp. 1483-1491, 2015.
8. Wun-She Yap, Joseph K. Liu, Syh-Yuan Tan and Bok-Min Goi. "On the security of a lightweight authentication and encryption scheme for mobile ad hoc network". In Wiley Security and Communication Networks. In Wiley Security and Communication Networks, Volume 8, Issue 17, pp. 3094-3098, 2015.
7. Jian Guo, Chunhua Su and Wun-She Yap. "An Improved Preimage Attack against HAVAL-3". In Elsevier Information Processing Letters, Volume 115, Issue 2, pp. 386-393, 2015.
6. Wun-She Yap and Bok-Min Goi. "Forgery Attacks of an Identity-Based Multi-Proxy Signature Scheme". In Wiley International Journal of Communication Systems, Voume 29, Issue 2, pp. 283-289, 2016.
5. Jiqiang Lu, Wun-She Yap, Matt Henricksen and Swee-Huay Heng. "Differential attack on nine rounds of the SEED block cipher".In Elsevier Information Processing Letters, Volume 114, Issue 3, pp. 116-123, 2014.
4. Wun-She Yap, Sze Ling Yeo, Swee-Huay Heng and Matt Henricksen."Parallelizable MAC Revisited". In Wiley Security and Communication Networks, Volume 7, Issue 7, pp. 1115-1127, 2014.
3. Wun-She Yap, Sze Ling Yeo, Swee-Huay Heng and Matt Henricksen."Security Analysis of GCM for Communication".In Wiley Security and Communication Networks, Volume 7, Issue 5, pages 854-864, 2014.
2. Sze Ling Yeo, Wun-She Yap, Joseph K. Liu and Matt Henricksen."Comments on "Analysis and improvement of a secure and efficient handover authentication based on bilinear pairing functions". In IEEE Communications Letters, Volume 17, Issue 8, pp. 1521-1523, 2013.
1. Sherman S.M. Chow and Wun-She Yap."Partial decryption attacks in security-mediated certificateless encryption".In IET Information Security - IET Information Security, Volume 3, Number 4, pp. 148-151, 2009.

Non SCI/SCIE Indexed
4. Badiul Alam, Zhe Jin, Wun-She Yap and Bok-Min Goi. "Cancellable Fingerprint Minutiae Template Protection using Bit Toggling Technique for Privacy Preserving". To appear.
3. Denis C.-K. Wong, Kuan Wai Wong and Wun-She Yap."Exhaustion 2-Subsets in Dihedral Groups of Order 2p". In Asian-European Journal of Mathematics.   https://doi.org/10.1142/S179355711850047X. 
2. Md Iftekhar Salam, Wei-Chuen Yau, Ji-Jian Chin, Swee-Huay Heng, Huo-Chong Ling, Raphael C.-W. Phan, Geong Sen Poh, Syh-Yuan Tan and Wun-She Yap. "Implementation of searchable symmetric encryption for privacy-preserving keyword search on cloud storage". In Human-centric Computing and Information Sciences, 5:19, 2015.
1. Syh-Yuan Tan, Wun-She Yap and Bok-Min Goi. "Linkability Attack of an ID-based Blind Signature Scheme". In International Journal of Cryptology Research, Volume 5, Issue 1, pages 21-27, 2015. 

Conference/Workshop

17. Kong-Yik Chee, Zhe Jin, Wun-She Yap and Bok-Min Goi. "Two-Dimensional Winner-Takes-All Hashing in Template Protection based on Fingerprint and Voice Feature Level Fusion". APSIPA ASC 2017.
16. Yen-Lung Lai, Zhe Jin, Bok-Min Goi, Tong-Yuen Chai and Wun-She Yap. "Iris Cancellable Template Generation Based on Indexing-First-One Hashing". NSS 2016.
15. Min Cherng Lee, Robin Mitra, Emmanuel Lazaridis, An Chow Lai, Yong Kheng Goh and Wun-She Yap. "Statistical disclosure control for data privacy using sequence of generalised linear models". ACISP 2016.
14. Jin Zhe, Wun-She Yap and Bok-Min Goi. "Fingerprint Minutiae Template Protection for Privacy Preserving". Cryptology 2016.
13. Md Iftekhar Salam, Wei-Chuen Yau, Ji-Jian Chin, Swee-Huay Heng, Huo-Chong Ling, Raphael C.-W. Phan, Geong Sen Poh, Syh-Yuan Tan and Wun-She Yap."PrivCloud: Privacy Preserving Data Storage and Retrieval System in Cloud Computing". In Infotech 2014
12. Syh-Yuan Tan, Wun-She Yap and Bok-Min Goi. "Cryptanalysis of an ID-Based Blind Signature Scheme". In Cryptology 2014
11. Jiqiang Lu, Wun-She Yap and Yongzhuang Wei."Weak Keys of the Full MISTY1 Block Cipher for Related-Key Cryptanalysis". In The Cryptographers' Track at the RSA Conference - CT-RSA 2013. Earlier version appeared in 2012 as part of Cryptology ePrint Archive: Report 2012/066
10. Wun-She Yap, Sze Ling Yeo and Chee Hoo Yian."Cryptanalysis of the Full CHAIN Cipher". In International Conference on Information Assurance and Security - IAS 2011
9. Shinsaku Kiyomoto, Matthew Henricksen, Wun-She Yap, Yuto Nakano and Kazuhide Fukushima."MASHA - Low Cost Authentication with a New Stream Cipher". In Information Security Conference - ISC 2011
8. Matthew Henricksen, Wun-She Yap, Chee Hoo Yian, Shinsaku Kiyomoto and Toshiaki Tanaka."Side-Channel Analysis of the K2 Stream Cipher". In Australasian Conference on Information Security and Privacy - ACISP 2010
7. Leonie Simpson, Matthew Henricksen and Wun-She Yap."Improved Cryptanalysis of the Common Scrambling Algorithm Stream Cipher". In Australasian Conference on Information Security and Privacy - ACISP 2009
6. Wun-She Yap, Swee-Huay Heng and Bok-Min Goi."On the Security of an Identity-Based Aggregate Signature Scheme". In International Symposium on Ubiquitous Application & Security Service - UASS 2008
5. Wun-She Yap, Sherman S.M. Chow, Swee-Huay Heng and Bok-Min Goi."Security Mediated Certificateless Signatures".In International Conference on Applied Cryptography and Network Security - ACNS 2007
4. Wun-She Yap, Swee-Huay Heng and Bok-Min Goi. "Cryptanalysis of Some Proxy Signature Schemes Without Certificates". In Workshop in Information Security Theory and Practices - WISTP 2007
3. Swee-Huay Heng, Wun-She Yap and Khoongming Khoo."Linkability of Some Blind Signature Schemes". In Workshop in Information Security Theory and Practices - WISTP 2007
2. Wun-She Yap, Swee-Huay Heng and Bok-Min Goi."Certificateless Encryption Schemes Revisited". In MMU International Symposium on Information and Communications Technologies - M2USIC 2006
1. Wun-She Yap, Swee-Huay Heng and Bok-Min Goi. "An Efficient Certificateless Signature Scheme".In International Workshop on Security in Ubiquitous Computing Systems - SecUbiq 2006









          

Disclaimer: I am personally responsible for any content and opinion posted on this homepage. The Universiti Tunku Abdul Rahman is not responsible for any contents found on this homepage or any opinion expressed herein.