Raphael Chung-Wei Phan


Ontology type: schema:Person     


Person Info

NAME

Raphael Chung-Wei

SURNAME

Phan

Publications in SciGraph latest 50 shown

  • 2022-03-29 Cube attacks on round-reduced TinyJAMBU in SCIENTIFIC REPORTS
  • 2020-09-02 Faceless identification based on temporal strips in MULTIMEDIA TOOLS AND APPLICATIONS
  • 2020-07-01 Cryptanalysis of genetic algorithm-based encryption scheme in MULTIMEDIA TOOLS AND APPLICATIONS
  • 2018-02-09 Separable authentication in encrypted HEVC video in MULTIMEDIA TOOLS AND APPLICATIONS
  • 2018-01-20 SPRING: a novel parallel chaos-based image encryption scheme in NONLINEAR DYNAMICS
  • 2017-08-19 Hybrid Facial Regions Extraction for Micro-expression Recognition System in JOURNAL OF SIGNAL PROCESSING SYSTEMS
  • 2017-07-14 Tuple Cryptanalysis: Slicing and Fusing Multisets in PARADIGMS IN CRYPTOLOGY – MYCRYPT 2016. MALICIOUS AND EXPLORATORY CRYPTOLOGY
  • 2017-07-04 SearchaStore: fast and secure searchable cloud services in CLUSTER COMPUTING
  • 2017-06-17 Speeding up the Montgomery Exponentiation with CMM-SDR Over GPU with Maxwell and Pascal Architecture in MOBILE AND WIRELESS TECHNOLOGIES 2017
  • 2017-03-16 Automatic Micro-expression Recognition from Long Video Using a Single Spotted Apex in COMPUTER VISION – ACCV 2016 WORKSHOPS
  • 2016-11-08 Effective recognition of facial micro-expressions with video motion magnification in MULTIMEDIA TOOLS AND APPLICATIONS
  • 2016-09-21 Higher order differentiation over finite fields with applications to generalising the cube attack in DESIGNS, CODES AND CRYPTOGRAPHY
  • 2016-02-02 Cryptanalysis of a High-Definition Image Encryption Based on AES Modification in WIRELESS PERSONAL COMMUNICATIONS
  • 2016-01-22 Fast implementation of block ciphers and PRNGs in Maxwell GPU architecture in CLUSTER COMPUTING
  • 2015-12-08 Comparison of Cube Attacks Over Different Vector Spaces in CRYPTOGRAPHY AND CODING
  • 2015-10-20 Twin-Beth: Security under active and concurrent attacks for the beth identity-based identification scheme in CRYPTOGRAPHY AND COMMUNICATIONS
  • 2015-07-17 Implementation of searchable symmetric encryption for privacy-preserving keyword search on cloud storage in HUMAN-CENTRIC COMPUTING AND INFORMATION SCIENCES
  • 2015-04-17 Spontaneous Subtle Expression Recognition: Imbalanced Databases and Solutions in COMPUTER VISION -- ACCV 2014
  • 2015-04-16 LBP with Six Intersection Points: Reducing Redundant Information in LBP-TOP for Micro-expression Recognition in COMPUTER VISION – ACCV 2014
  • 2015-04-11 Subtle Expression Recognition Using Optical Strain Weighted Features in COMPUTER VISION - ACCV 2014 WORKSHOPS
  • 2015-02-17 Cryptanalysis of a new image alternate encryption algorithm based on chaotic map in NONLINEAR DYNAMICS
  • 2014-09-26 Cryptanalysis of a chaotic map-based password-authenticated key agreement protocol using smart cards in NONLINEAR DYNAMICS
  • 2014 The Hash Function BLAKE in NONE
  • 2013-11-06 Security Analysis of a Chaotic Map-based Authentication Scheme for Telecare Medicine Information Systems in JOURNAL OF MEDICAL SYSTEMS
  • 2013-02-07 Computing the linear complexity for sequences with characteristic polynomial fv in CRYPTOGRAPHY AND COMMUNICATIONS
  • 2013 Efficient Generation of Elementary Sequences in CRYPTOGRAPHY AND CODING
  • 2012-07-28 Security models for delegated keyword searching within encrypted contents in JOURNAL OF INTERNET SERVICES AND APPLICATIONS
  • 2012-05-02 Integrating Mobility, Quality-of-service and Security in Future Mobile Networks in ELECTRICAL ENGINEERING AND INTELLIGENT SYSTEMS
  • 2012-02-22 A formally verified AKA protocol for vertical handover in heterogeneous environments using Casper/FDR in EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING
  • 2012 Energy-Efficient Cryptographic Engineering Paradigm in OPEN PROBLEMS IN NETWORK SECURITY
  • 2012 Index Tables of Finite Fields and Modular Golomb Rulers in SEQUENCES AND THEIR APPLICATIONS – SETA 2012
  • 2012 Fooling a Liveness-Detecting Capacitive Fingerprint Scanner in CRYPTOGRAPHY AND SECURITY: FROM THEORY TO APPLICATIONS
  • 2011-10-04 Cheating Resistance of a Secure Incentive Protocol for Mobile Ad Hoc Networks in WIRELESS PERSONAL COMMUNICATIONS
  • 2011-03-15 Non-repudiable authentication and billing architecture for wireless mesh networks in WIRELESS NETWORKS
  • 2011 On the Stability of m-Sequences in CRYPTOGRAPHY AND CODING
  • 2011 On the Security of a Hybrid SVD-DCT Watermarking Method Based on LPSNR in ADVANCES IN IMAGE AND VIDEO TECHNOLOGY
  • 2011 Evidential Notions of Defensibility and Admissibility with Property Preservation in OPEN RESEARCH PROBLEMS IN NETWORK SECURITY
  • 2011 A Variant of Schnorr Identity-Based Identification Scheme with Tight Reduction in FUTURE GENERATION INFORMATION TECHNOLOGY
  • 2011 Cryptanalysis of a Provably Secure Cross-Realm Client-to-Client Password-Authenticated Key Agreement Protocol of CANS ’09 in CRYPTOLOGY AND NETWORK SECURITY
  • 2011 Quasi-Linear Cryptanalysis of a Secure RFID Ultralightweight Authentication Protocol in INFORMATION SECURITY AND CRYPTOLOGY
  • 2011 On the Security of a Robust Watermarking Scheme Based on RDWT-SVD in FUTURE GENERATION INFORMATION TECHNOLOGY
  • 2011 Adversarial Security: Getting to the Root of the Problem in OPEN RESEARCH PROBLEMS IN NETWORK SECURITY
  • 2010-12-25 Analyzing the Secure Simple Pairing in Bluetooth v4.0 in WIRELESS PERSONAL COMMUNICATIONS
  • 2010-06-23 Notions and relations for RKA-secure permutation and function families in DESIGNS, CODES AND CRYPTOGRAPHY
  • 2010-04-20 Privacy Analysis of Forward and Backward Untraceable RFID Authentication Schemes in WIRELESS PERSONAL COMMUNICATIONS
  • 2010 Cryptanalysis of the David-Prasad RFID Ultralightweight Authentication Protocol in RADIO FREQUENCY IDENTIFICATION: SECURITY AND PRIVACY ISSUES
  • 2010 Integral Distinguishers of Some SHA-3 Candidates in CRYPTOLOGY AND NETWORK SECURITY
  • 2010 Proxy Re-encryption with Keyword Search: New Definitions and Algorithms in SECURITY TECHNOLOGY, DISASTER RECOVERY AND BUSINESS CONTINUITY
  • 2010 Analysis on the Improved SVD-Based Watermarking Scheme in ADVANCES IN COMPUTER SCIENCE AND INFORMATION TECHNOLOGY
  • 2009-12-15 Analysis of a Buyer–Seller Watermarking Protocol for Trustworthy Purchasing of Digital Contents in WIRELESS PERSONAL COMMUNICATIONS
  • JSON-LD is the canonical representation for SciGraph data.

    TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

    [
      {
        "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
        "affiliation": [
          {
            "affiliation": {
              "id": "http://www.grid.ac/institutes/grid.440425.3", 
              "type": "Organization"
            }, 
            "isCurrent": true, 
            "type": "OrganizationRole"
          }, 
          {
            "id": "http://www.grid.ac/institutes/grid.6571.5", 
            "type": "Organization"
          }, 
          {
            "id": "http://www.grid.ac/institutes/grid.15822.3c", 
            "type": "Organization"
          }, 
          {
            "id": "http://www.grid.ac/institutes/grid.1002.3", 
            "type": "Organization"
          }, 
          {
            "id": "http://www.grid.ac/institutes/grid.5333.6", 
            "type": "Organization"
          }, 
          {
            "id": "http://www.grid.ac/institutes/grid.449515.8", 
            "type": "Organization"
          }, 
          {
            "id": "http://www.grid.ac/institutes/grid.411865.f", 
            "type": "Organization"
          }, 
          {
            "id": "http://www.grid.ac/institutes/grid.1027.4", 
            "type": "Organization"
          }
        ], 
        "familyName": "Phan", 
        "givenName": "Raphael Chung-Wei", 
        "id": "sg:person.014732232610.32", 
        "identifier": [
          {
            "name": "orcid_id", 
            "type": "PropertyValue", 
            "value": "0000-0001-7448-4595"
          }
        ], 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014732232610.32", 
          "https://orcid.org/0000-0001-7448-4595"
        ], 
        "sdDataset": "persons", 
        "sdDatePublished": "2022-05-20T08:05", 
        "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
        "sdPublisher": {
          "name": "Springer Nature - SN SciGraph project", 
          "type": "Organization"
        }, 
        "sdSource": "s3://com-springernature-scigraph/baseset/20220519/entities/gbq_results/person/person_938.jsonl", 
        "type": "Person"
      }
    ]
     

    Download the RDF metadata as:  json-ld nt turtle xml License info

    HOW TO GET THIS DATA PROGRAMMATICALLY:

    JSON-LD is a popular format for linked data which is fully compatible with JSON.

    curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/person.014732232610.32'

    N-Triples is a line-based linked data format ideal for batch operations.

    curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/person.014732232610.32'

    Turtle is a human-readable linked data format.

    curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/person.014732232610.32'

    RDF/XML is a standard XML format for linked data.

    curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/person.014732232610.32'


     

    This table displays all metadata directly associated to this object as RDF triples.

    35 TRIPLES      11 PREDICATES      20 URIs      8 LITERALS      3 BLANK NODES

    Subject Predicate Object
    1 sg:person.014732232610.32 schema:affiliation N9ea54a942fe540e6ac2dff05fb511800
    2 grid-institutes:grid.1002.3
    3 grid-institutes:grid.1027.4
    4 grid-institutes:grid.15822.3c
    5 grid-institutes:grid.411865.f
    6 grid-institutes:grid.449515.8
    7 grid-institutes:grid.5333.6
    8 grid-institutes:grid.6571.5
    9 schema:familyName Phan
    10 schema:givenName Raphael Chung-Wei
    11 schema:identifier N475f7d5236f1484fa599fc8209719d20
    12 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014732232610.32
    13 https://orcid.org/0000-0001-7448-4595
    14 schema:sdDatePublished 2022-05-20T08:05
    15 schema:sdLicense https://scigraph.springernature.com/explorer/license/
    16 schema:sdPublisher N3850a2f14c5340f4abe7bc6b4cb8f25f
    17 sgo:license sg:explorer/license/
    18 sgo:sdDataset persons
    19 rdf:type schema:Person
    20 N3850a2f14c5340f4abe7bc6b4cb8f25f schema:name Springer Nature - SN SciGraph project
    21 rdf:type schema:Organization
    22 N475f7d5236f1484fa599fc8209719d20 schema:name orcid_id
    23 schema:value 0000-0001-7448-4595
    24 rdf:type schema:PropertyValue
    25 N9ea54a942fe540e6ac2dff05fb511800 schema:affiliation grid-institutes:grid.440425.3
    26 sgo:isCurrent true
    27 rdf:type schema:OrganizationRole
    28 grid-institutes:grid.1002.3 schema:Organization
    29 grid-institutes:grid.1027.4 schema:Organization
    30 grid-institutes:grid.15822.3c schema:Organization
    31 grid-institutes:grid.411865.f schema:Organization
    32 grid-institutes:grid.440425.3 schema:Organization
    33 grid-institutes:grid.449515.8 schema:Organization
    34 grid-institutes:grid.5333.6 schema:Organization
    35 grid-institutes:grid.6571.5 schema:Organization
     




    Preview window. Press ESC to close (or click here)


    ...