Supakorn Kungpisdan

According to our database1, Supakorn Kungpisdan authored at least 12 papers between 2001 and 2015.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2015
A secure lightweight protocol for NFC communications with mutual authentication based on limited-use of session keys.
Proceedings of the 2015 International Conference on Information Networking, 2015

An accountability model for Internet transactions.
Proceedings of the 2015 International Conference on Information Networking, 2015

2014
Accountability in internet transactions revisited.
Proceedings of the 14th International Symposium on Communications and Information Technologies, 2014

A novel web content spoofing technique on WLAN and its countermeasures.
Proceedings of the 14th International Symposium on Communications and Information Technologies, 2014

2011
Design and implementation of improved security protocols for DHCP using digital certificates.
Proceedings of the 17th IEEE International Conference on Networks, 2011

2004
A Limited-Used Key Generation Scheme for Internet Transactions.
Proceedings of the Information Security Applications, 5th International Workshop, 2004

A Secure Prepaid Wireless Micropayment Protocol.
Proceedings of the Security In Information Systems, 2004

Accountability Logic for Mobile Payment Protocols.
Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04), 2004

A Secure Account-Based Mobile Payment Protocol.
Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04), 2004

A Secure Wireless Prepaid Micropayment Protocol With Extension to Postpaid Micropayment.
Proceedings of the iiWAS'2004, 2004

2003
Lightweight Mobile Credit-Card Payment Protocol.
Proceedings of the Progress in Cryptology, 2003

2001
Practical Reasoning about Accountability in Electronic Commerce Protocols.
Proceedings of the Information Security and Cryptology, 2001


  Loading...