Name
Playground
About
FAQ
GitHub
Playground
Shortest Path Finder
Community Detector
Connected Papers
Author Trending
Charlems Álvarez Jimenez
Daniel P. Kennedy
Roland Zumkeller
Maximilian Dürr
Peng Wu
Dan Graur
Liangliang Shang
Chen Ma
Barbara Aquilani
Xiuxian Li
Home
/
Author
/
CHANATHIP NAMPREMPRE
Author Info
Open Visualization
Name
Affiliation
Papers
CHANATHIP NAMPREMPRE
Thammasat Univ, Dept Elect & Comp Engn, Bangkok, Thailand
18
Collaborators
Citations
PageRank
18
600
28.88
Referers
Referees
References
993
219
254
Search Limit
100
993
Publications (18 rows)
Collaborators (18 rows)
Referers (100 rows)
Referees (100 rows)
Title
Citations
PageRank
Year
Reconsidering Generic Composition.
14
0.70
2014
AE5 Security Notions: Definitions Implicit in the CAESAR Call.
0
0.34
2013
On-line Ciphers and the Hash-CBC Constructions
12
0.69
2012
Mitigating Dictionary Attacks With Text-Graphics Character Captchas
4
0.44
2007
Mitigating Dictionary Attacks with Text-Graphics Character CAPTCHAs*Based on "A Text-Graphics Character CAPTCHA for Password Authentication," by M.N. Dailey and C. Namprempre, which appeared in the TENCON 2004 Conference Proceedings, ©2004, IEEE.
5
0.48
2007
Unrestricted Aggregate Signatures
47
1.77
2007
A Study of Blind Message Authentication Codes
1
0.35
2007
On the (im)possibility of blind message authentication codes
14
0.63
2006
The Secure Shell (SSH) Transport Layer Encryption Modes
13
1.06
2006
Security Proofs for Identity-Based Identification and Signature Schemes
194
7.32
2004
From Identification to Signatures via the Fiat-Shamir Transform: Minimizing Assumptions for Security and Forward-Security
67
3.97
2002
Breaking and provably repairing the SSH authenticated encryption scheme: A case study of the Encode-then-Encrypt-and-MAC paradigm
50
2.53
2002
Secure Channels Based on Authenticated Encryption Schemes: A Simple Characterization
6
0.71
2002
Authenticated encryption in SSH: provably fixing the SSH binary packet protocol
31
2.54
2002
The Power of RSA Inversion Oracles and the Security of Chaum's RSA-Based Blind Signature Scheme
47
2.25
2001
The One-More-RSA-Inversion Problems and the Security of Chaum's Blind Signature Scheme.
92
2.21
2001
Forward Security in Threshold Signature Schemes
2
0.53
2000
Implementing causal logging using OrbixWeb interception
1
0.36
1999
1