Pairat Thorncharoensri

Orcid: 0000-0002-1465-2718

According to our database1, Pairat Thorncharoensri authored at least 15 papers between 2007 and 2022.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2022
Privacy-preserving file sharing on cloud storage with certificateless signcryption.
Theor. Comput. Sci., 2022

2021
A Novel Instructional Design Based on Cognitive Apprenticeship Model to Enhance Teaching Network Management.
Proceedings of the 2021 IEEE International Conference on Engineering, 2021

2020
Aggregatable Certificateless Designated Verifier Signature.
IEEE Access, 2020

2019
Efficient Controlled Signature for a Large Network with Multi Security-level Setting.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2019

CAPTCHA Design and Security Issues.
Proceedings of the Advances in Cyber Security: Principles, Techniques, and Applications., 2019

2018
Policy controlled system with anonymity.
Theor. Comput. Sci., 2018

2017
Policy-controlled signatures and their applications.
Comput. Stand. Interfaces, 2017

2014
Fair Multi-signature.
Proceedings of the Information Security Applications - 15th International Workshop, 2014

2012
Multi-Level Controlled Signature.
Proceedings of the Information Security Applications - 13th International Workshop, 2012

2009
Identity-Based Identification Scheme Secure against Concurrent-Reset Attacks without Random Oracles.
Proceedings of the Information Security Applications, 10th International Workshop, 2009

Universal Designated Verifier Signatures with Threshold-Signers.
Proceedings of the Advances in Information and Computer Security, 2009

Policy-Controlled Signatures.
Proceedings of the Information and Communications Security, 11th International Conference, 2009

Escrowed Deniable Identification Schemes.
Proceedings of the Security Technology, 2009

2008
How to Balance Privacy with Authenticity.
Proceedings of the Information Security and Cryptology, 2008

2007
How to Find the Sufficient Collision Conditions for Haval-128 Pass 3 by Backward Analysis.
Int. J. Netw. Secur., 2007


  Loading...