Dynamic salt generation and placement for secure password storing S Boonkrong, C Somboonpattanakit IAENG International Journal of Computer Science 43 (1), 27-36, 2016 | 42 | 2016 |
Authentication and Access Control: Practical Cryptography Methods and Tools S Boonkrong Apress, 2021 | 31 | 2021 |
Internet banking login with multi-factor authentication S Boonkrong KSII Transactions on Internet and Information Systems (TIIS) 11 (1), 511-535, 2017 | 17 | 2017 |
Security of passwords S Boonkrong Information Technology Journal 8 (2), 112-117, 2012 | 17 | 2012 |
Social network monitoring application for parents with children under thirteen P Santisarun, S Boonkrong 2015 7th International Conference on Knowledge and Smart Technology (KST), 75-80, 2015 | 15 | 2015 |
A survey on smartphone authentication S Vongsingthong, S Boonkrong Walailak Journal of Science and Technology (WJST) 12 (1), 1-19, 2014 | 15 | 2014 |
The comparison of impacts to android phone battery between polling data and pushing data PC Dinh, S Boonkrong IISRO Multi-Conferences Proceeding. Thailand, 84-89, 2013 | 13 | 2013 |
Multi-factor authentication S Boonkrong, S Boonkrong Authentication and Access Control: Practical Cryptography Methods and Tools …, 2021 | 11 | 2021 |
Methods and threats of authentication S Boonkrong, S Boonkrong Authentication and Access Control: Practical Cryptography Methods and Tools …, 2021 | 10 | 2021 |
Dynamic Salt Generating Scheme Using Seeds Warehouse Table Coordinates J Zhang, S Boonkrong 2015 2nd International Conference on Information Science and Security (ICISS …, 2015 | 8 | 2015 |
Finding a suitable threshold value for an iris-based authentication system N Wangkeeree, S Boonkrong International Journal of Electrical and Computer Engineering (IJECE) 9 (5 …, 2019 | 7 | 2019 |
Improving Security with Two-factor Authentication Using Image S Mahitthiburin, S Boonkrong Applied Science and Engineering Progress 8 (1), 33-43, 2015 | 7 | 2015 |
An Analysis of Numerical Grid-Based Authentication S Boonkrong Proceedings of the 9th International Conference on Information Communication …, 2019 | 5 | 2019 |
Finding the optimal value for threshold cryptography on cloud computing W Janratchakool, S Boonkrong, S Smanchat International Journal of Electrical and Computer Engineering (IJECE) 6 (6 …, 2016 | 5 | 2016 |
Recent advances in information and communication technology 2015 H Unger, P Meesad, S Boonkrong Springer International Publishing, 2015 | 5 | 2015 |
Security Analysis and Improvement of a Multi-Factor Biometric-Based Remote Authentication Scheme. S Boonkrong IAENG International Journal of Computer Science 46 (4), 2019 | 4 | 2019 |
Reducing battery consumption of data polling and pushing techniques on Android using GZip S Boonkrong, PC Dinh 2015 7th International Conference on Information Technology and Electrical …, 2015 | 4 | 2015 |
On the distributions of user behaviors in complex online social networks S Vongsingthong, S Boonkrong, M Kubek, H Unger Recent Advances in Information and Communication Technology 2015 …, 2015 | 4 | 2015 |
A more secure and efficient Andrew Secure RPC protocol S Boonkrong Security and Communication Networks 7 (11), 2063-2077, 2014 | 4 | 2014 |
Authentication in mobile ad hoc networks S Boonkrong, R Bradford Proceedings of the 1st Thailand Computer Science Conference (ThCSC), 202-207, 2004 | 4 | 2004 |