Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Pairat Thorncharoensri
@article{DBLP:journals/tcs/Thorncharoensri22, author = {Pairat Thorncharoensri and Willy Susilo and Yang{-}Wai Chow}, title = {Privacy-preserving file sharing on cloud storage with certificateless signcryption}, journal = {Theor. Comput. Sci.}, volume = {916}, pages = {1--21}, year = {2022}, url = {https://doi.org/10.1016/j.tcs.2022.02.033}, doi = {10.1016/J.TCS.2022.02.033}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcs/Thorncharoensri22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tale/MukherjeeLTTS21, author = {Madhav Mukherjee and Ngoc{-}Thuy Le and William John Tibben and Pairat Thorncharoensri and Jun Shen}, title = {A Novel Instructional Design Based on Cognitive Apprenticeship Model to Enhance Teaching Network Management}, booktitle = {2021 {IEEE} International Conference on Engineering, Technology {\&} Education (TALE), Wuhan, Hubei Province, China, December 5-8, 2021}, pages = {479--486}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/TALE52509.2021.9678607}, doi = {10.1109/TALE52509.2021.9678607}, timestamp = {Wed, 20 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tale/MukherjeeLTTS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/Thorncharoensri20, author = {Pairat Thorncharoensri and Willy Susilo and Joonsang Baek}, title = {Aggregatable Certificateless Designated Verifier Signature}, journal = {{IEEE} Access}, volume = {8}, pages = {95019--95031}, year = {2020}, url = {https://doi.org/10.1109/ACCESS.2020.2987336}, doi = {10.1109/ACCESS.2020.2987336}, timestamp = {Tue, 16 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/Thorncharoensri20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/Thorncharoensri19, author = {Pairat Thorncharoensri and Willy Susilo and Joonsang Baek}, title = {Efficient Controlled Signature for a Large Network with Multi Security-level Setting}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {10}, number = {3}, pages = {1--20}, year = {2019}, url = {https://doi.org/10.22667/JOWUA.2019.09.30.001}, doi = {10.22667/JOWUA.2019.09.30.001}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/Thorncharoensri19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/18/ChowST19, author = {Yang{-}Wai Chow and Willy Susilo and Pairat Thorncharoensri}, editor = {Kuan{-}Ching Li and Xiaofeng Chen and Willy Susilo}, title = {{CAPTCHA} Design and Security Issues}, booktitle = {Advances in Cyber Security: Principles, Techniques, and Applications}, pages = {69--92}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-981-13-1483-4\_4}, doi = {10.1007/978-981-13-1483-4\_4}, timestamp = {Thu, 14 Oct 2021 08:45:55 +0200}, biburl = {https://dblp.org/rec/books/sp/18/ChowST19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/Thorncharoensri18, author = {Pairat Thorncharoensri and Willy Susilo and Yi Mu}, title = {Policy controlled system with anonymity}, journal = {Theor. Comput. Sci.}, volume = {745}, pages = {87--113}, year = {2018}, url = {https://doi.org/10.1016/j.tcs.2018.05.038}, doi = {10.1016/J.TCS.2018.05.038}, timestamp = {Mon, 17 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcs/Thorncharoensri18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csi/Thorncharoensri17, author = {Pairat Thorncharoensri and Willy Susilo and Yi Mu}, title = {Policy-controlled signatures and their applications}, journal = {Comput. Stand. Interfaces}, volume = {50}, pages = {26--41}, year = {2017}, url = {https://doi.org/10.1016/j.csi.2016.08.005}, doi = {10.1016/J.CSI.2016.08.005}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csi/Thorncharoensri17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/ThorncharoensriSM14, author = {Pairat Thorncharoensri and Willy Susilo and Yi Mu}, editor = {Kyung Hyune Rhee and Jeong Hyun Yi}, title = {Fair Multi-signature}, booktitle = {Information Security Applications - 15th International Workshop, {WISA} 2014, Jeju Island, Korea, August 25-27, 2014. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8909}, pages = {244--256}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-15087-1\_19}, doi = {10.1007/978-3-319-15087-1\_19}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/ThorncharoensriSM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/ThorncharoensriSM12, author = {Pairat Thorncharoensri and Willy Susilo and Yi Mu}, editor = {Dong Hoon Lee and Moti Yung}, title = {Multi-Level Controlled Signature}, booktitle = {Information Security Applications - 13th International Workshop, {WISA} 2012, Jeju Island, Korea, August 16-18, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7690}, pages = {96--110}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35416-8\_8}, doi = {10.1007/978-3-642-35416-8\_8}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/ThorncharoensriSM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fgit/ThorncharoensriHSAMW09, author = {Pairat Thorncharoensri and Qiong Huang and Willy Susilo and Man Ho Au and Yi Mu and Duncan S. Wong}, editor = {Dominik Slezak and Tai{-}Hoon Kim and Wai{-}Chi Fang and Kirk P. Arnett}, title = {Escrowed Deniable Identification Schemes}, booktitle = {Security Technology - International Conference, SecTech 2009, Held as Part of the Future Generation Information Technology Conference, {FGIT} 2009, Jeju Island, Korea, December 10-12, 2009. Proceedings}, series = {Communications in Computer and Information Science}, volume = {58}, pages = {234--241}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10847-1\_29}, doi = {10.1007/978-3-642-10847-1\_29}, timestamp = {Wed, 20 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fgit/ThorncharoensriHSAMW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/ThorncharoensriSM09, author = {Pairat Thorncharoensri and Willy Susilo and Yi Mu}, editor = {Sihan Qing and Chris J. Mitchell and Guilin Wang}, title = {Policy-Controlled Signatures}, booktitle = {Information and Communications Security, 11th International Conference, {ICICS} 2009, Beijing, China, December 14-17, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5927}, pages = {91--106}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-11145-7\_9}, doi = {10.1007/978-3-642-11145-7\_9}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icics/ThorncharoensriSM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/ThorncharoensriSM09, author = {Pairat Thorncharoensri and Willy Susilo and Yi Mu}, editor = {Tsuyoshi Takagi and Masahiro Mambo}, title = {Universal Designated Verifier Signatures with Threshold-Signers}, booktitle = {Advances in Information and Computer Security, 4th International Workshop on Security, {IWSEC} 2009, Toyama, Japan, October 28-30, 2009, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5824}, pages = {89--109}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04846-3\_7}, doi = {10.1007/978-3-642-04846-3\_7}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/ThorncharoensriSM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/ThorncharoensriSM09, author = {Pairat Thorncharoensri and Willy Susilo and Yi Mu}, editor = {Heung Youl Youm and Moti Yung}, title = {Identity-Based Identification Scheme Secure against Concurrent-Reset Attacks without Random Oracles}, booktitle = {Information Security Applications, 10th International Workshop, {WISA} 2009, Busan, Korea, August 25-27, 2009, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5932}, pages = {94--108}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10838-9\_8}, doi = {10.1007/978-3-642-10838-9\_8}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/ThorncharoensriSM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/ThorncharoensriSM08, author = {Pairat Thorncharoensri and Willy Susilo and Yi Mu}, editor = {Pil Joong Lee and Jung Hee Cheon}, title = {How to Balance Privacy with Authenticity}, booktitle = {Information Security and Cryptology - {ICISC} 2008, 11th International Conference, Seoul, Korea, December 3-5, 2008, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5461}, pages = {184--201}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-00730-9\_12}, doi = {10.1007/978-3-642-00730-9\_12}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/ThorncharoensriSM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/ThorncharoensriXM07, author = {Pairat Thorncharoensri and Tianbing Xia and Yi Mu}, title = {How to Find the Sufficient Collision Conditions for Haval-128 Pass 3 by Backward Analysis}, journal = {Int. J. Netw. Secur.}, volume = {4}, number = {2}, pages = {138--148}, year = {2007}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v4-n2/ijns-2007-v4-n2-p138-148.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/ThorncharoensriXM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.