BibTeX records: Pairat Thorncharoensri

download as .bib file

@article{DBLP:journals/tcs/Thorncharoensri22,
  author       = {Pairat Thorncharoensri and
                  Willy Susilo and
                  Yang{-}Wai Chow},
  title        = {Privacy-preserving file sharing on cloud storage with certificateless
                  signcryption},
  journal      = {Theor. Comput. Sci.},
  volume       = {916},
  pages        = {1--21},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.tcs.2022.02.033},
  doi          = {10.1016/J.TCS.2022.02.033},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcs/Thorncharoensri22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tale/MukherjeeLTTS21,
  author       = {Madhav Mukherjee and
                  Ngoc{-}Thuy Le and
                  William John Tibben and
                  Pairat Thorncharoensri and
                  Jun Shen},
  title        = {A Novel Instructional Design Based on Cognitive Apprenticeship Model
                  to Enhance Teaching Network Management},
  booktitle    = {2021 {IEEE} International Conference on Engineering, Technology {\&}
                  Education (TALE), Wuhan, Hubei Province, China, December 5-8, 2021},
  pages        = {479--486},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/TALE52509.2021.9678607},
  doi          = {10.1109/TALE52509.2021.9678607},
  timestamp    = {Wed, 20 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tale/MukherjeeLTTS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/Thorncharoensri20,
  author       = {Pairat Thorncharoensri and
                  Willy Susilo and
                  Joonsang Baek},
  title        = {Aggregatable Certificateless Designated Verifier Signature},
  journal      = {{IEEE} Access},
  volume       = {8},
  pages        = {95019--95031},
  year         = {2020},
  url          = {https://doi.org/10.1109/ACCESS.2020.2987336},
  doi          = {10.1109/ACCESS.2020.2987336},
  timestamp    = {Tue, 16 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/Thorncharoensri20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/Thorncharoensri19,
  author       = {Pairat Thorncharoensri and
                  Willy Susilo and
                  Joonsang Baek},
  title        = {Efficient Controlled Signature for a Large Network with Multi Security-level
                  Setting},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {10},
  number       = {3},
  pages        = {1--20},
  year         = {2019},
  url          = {https://doi.org/10.22667/JOWUA.2019.09.30.001},
  doi          = {10.22667/JOWUA.2019.09.30.001},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/Thorncharoensri19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/18/ChowST19,
  author       = {Yang{-}Wai Chow and
                  Willy Susilo and
                  Pairat Thorncharoensri},
  editor       = {Kuan{-}Ching Li and
                  Xiaofeng Chen and
                  Willy Susilo},
  title        = {{CAPTCHA} Design and Security Issues},
  booktitle    = {Advances in Cyber Security: Principles, Techniques, and Applications},
  pages        = {69--92},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-981-13-1483-4\_4},
  doi          = {10.1007/978-981-13-1483-4\_4},
  timestamp    = {Thu, 14 Oct 2021 08:45:55 +0200},
  biburl       = {https://dblp.org/rec/books/sp/18/ChowST19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcs/Thorncharoensri18,
  author       = {Pairat Thorncharoensri and
                  Willy Susilo and
                  Yi Mu},
  title        = {Policy controlled system with anonymity},
  journal      = {Theor. Comput. Sci.},
  volume       = {745},
  pages        = {87--113},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.tcs.2018.05.038},
  doi          = {10.1016/J.TCS.2018.05.038},
  timestamp    = {Mon, 17 Sep 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcs/Thorncharoensri18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csi/Thorncharoensri17,
  author       = {Pairat Thorncharoensri and
                  Willy Susilo and
                  Yi Mu},
  title        = {Policy-controlled signatures and their applications},
  journal      = {Comput. Stand. Interfaces},
  volume       = {50},
  pages        = {26--41},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.csi.2016.08.005},
  doi          = {10.1016/J.CSI.2016.08.005},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/csi/Thorncharoensri17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/ThorncharoensriSM14,
  author       = {Pairat Thorncharoensri and
                  Willy Susilo and
                  Yi Mu},
  editor       = {Kyung Hyune Rhee and
                  Jeong Hyun Yi},
  title        = {Fair Multi-signature},
  booktitle    = {Information Security Applications - 15th International Workshop, {WISA}
                  2014, Jeju Island, Korea, August 25-27, 2014. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8909},
  pages        = {244--256},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-15087-1\_19},
  doi          = {10.1007/978-3-319-15087-1\_19},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/ThorncharoensriSM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/ThorncharoensriSM12,
  author       = {Pairat Thorncharoensri and
                  Willy Susilo and
                  Yi Mu},
  editor       = {Dong Hoon Lee and
                  Moti Yung},
  title        = {Multi-Level Controlled Signature},
  booktitle    = {Information Security Applications - 13th International Workshop, {WISA}
                  2012, Jeju Island, Korea, August 16-18, 2012, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7690},
  pages        = {96--110},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35416-8\_8},
  doi          = {10.1007/978-3-642-35416-8\_8},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/ThorncharoensriSM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fgit/ThorncharoensriHSAMW09,
  author       = {Pairat Thorncharoensri and
                  Qiong Huang and
                  Willy Susilo and
                  Man Ho Au and
                  Yi Mu and
                  Duncan S. Wong},
  editor       = {Dominik Slezak and
                  Tai{-}Hoon Kim and
                  Wai{-}Chi Fang and
                  Kirk P. Arnett},
  title        = {Escrowed Deniable Identification Schemes},
  booktitle    = {Security Technology - International Conference, SecTech 2009, Held
                  as Part of the Future Generation Information Technology Conference,
                  {FGIT} 2009, Jeju Island, Korea, December 10-12, 2009. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {58},
  pages        = {234--241},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-10847-1\_29},
  doi          = {10.1007/978-3-642-10847-1\_29},
  timestamp    = {Wed, 20 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fgit/ThorncharoensriHSAMW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/ThorncharoensriSM09,
  author       = {Pairat Thorncharoensri and
                  Willy Susilo and
                  Yi Mu},
  editor       = {Sihan Qing and
                  Chris J. Mitchell and
                  Guilin Wang},
  title        = {Policy-Controlled Signatures},
  booktitle    = {Information and Communications Security, 11th International Conference,
                  {ICICS} 2009, Beijing, China, December 14-17, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5927},
  pages        = {91--106},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-11145-7\_9},
  doi          = {10.1007/978-3-642-11145-7\_9},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icics/ThorncharoensriSM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/ThorncharoensriSM09,
  author       = {Pairat Thorncharoensri and
                  Willy Susilo and
                  Yi Mu},
  editor       = {Tsuyoshi Takagi and
                  Masahiro Mambo},
  title        = {Universal Designated Verifier Signatures with Threshold-Signers},
  booktitle    = {Advances in Information and Computer Security, 4th International Workshop
                  on Security, {IWSEC} 2009, Toyama, Japan, October 28-30, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5824},
  pages        = {89--109},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04846-3\_7},
  doi          = {10.1007/978-3-642-04846-3\_7},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/ThorncharoensriSM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/ThorncharoensriSM09,
  author       = {Pairat Thorncharoensri and
                  Willy Susilo and
                  Yi Mu},
  editor       = {Heung Youl Youm and
                  Moti Yung},
  title        = {Identity-Based Identification Scheme Secure against Concurrent-Reset
                  Attacks without Random Oracles},
  booktitle    = {Information Security Applications, 10th International Workshop, {WISA}
                  2009, Busan, Korea, August 25-27, 2009, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5932},
  pages        = {94--108},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-10838-9\_8},
  doi          = {10.1007/978-3-642-10838-9\_8},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/ThorncharoensriSM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/ThorncharoensriSM08,
  author       = {Pairat Thorncharoensri and
                  Willy Susilo and
                  Yi Mu},
  editor       = {Pil Joong Lee and
                  Jung Hee Cheon},
  title        = {How to Balance Privacy with Authenticity},
  booktitle    = {Information Security and Cryptology - {ICISC} 2008, 11th International
                  Conference, Seoul, Korea, December 3-5, 2008, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5461},
  pages        = {184--201},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-00730-9\_12},
  doi          = {10.1007/978-3-642-00730-9\_12},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/ThorncharoensriSM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/ThorncharoensriXM07,
  author       = {Pairat Thorncharoensri and
                  Tianbing Xia and
                  Yi Mu},
  title        = {How to Find the Sufficient Collision Conditions for Haval-128 Pass
                  3 by Backward Analysis},
  journal      = {Int. J. Netw. Secur.},
  volume       = {4},
  number       = {2},
  pages        = {138--148},
  year         = {2007},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v4-n2/ijns-2007-v4-n2-p138-148.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/ThorncharoensriXM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics