Personal information

Verified email addresses

authentication, cyber security, cryptography, cryptographic protocol
Thailand

Activities

Employment (3)

Suranaree University of Technology: Nakhon Ratchasima, TH

2022-07-27 to present | Associate Professor (Institute of Digital Arts and Science)
Employment
Source: Self-asserted source
Sirapat Boonkrong

Suranaree University of Technology: Nakhon Ratchasima, TH

2017-10-02 to 2022-07-27 | Associate Professor (School of Information Technology)
Employment
Source: Self-asserted source
Sirapat Boonkrong

King Mongkut's University of Technology North Bangkok: Bangkok, TH

2009-08-17 to 2017-08-31 (Faculty of Information Technology)
Employment
Source: Self-asserted source
Sirapat Boonkrong

Education and qualifications (2)

University of Bath: Bath, Bath and North East Somer, GB

2002-09 to 2006-06 | Ph.D. in Computer Science (Department of Computer Science)
Education
Source: Self-asserted source
Sirapat Boonkrong

University of Bath: Bath, Bath and North East Somer, GB

1999-09 to 2002-06 | B.Sc. in Computer Science (Department of Computer Science)
Education
Source: Self-asserted source
Sirapat Boonkrong

Works (43)

Attack Model for Generic Intelligent Systems

Journal of Applied Security Research
2025-01-02 | Journal article
Contributors: Sirapat Boonkrong
Source: check_circle
Crossref

Design of an academic document forgery detection system

OpenAlex
2024-06-21 | Other
Contributors: Sirapat Boonkrong
Source: check_circle
DataCite

Design of an academic document forgery detection system

OpenAlex
2024-06-21 | Other
Contributors: Sirapat Boonkrong
Source: check_circle
DataCite

Design of an academic document forgery detection system

International Journal of Information Technology
2024-06-21 | Journal article
Contributors: Sirapat Boonkrong
Source: check_circle
Crossref

Blockchain-Based Supply Chain System-A Proof of Concept for the Coffee Industry

OpenAlex
2024-01-12 | Other
Contributors: Sirapat Boonkrong; Kittipop Srakhatong; Pongsakorn Lanjaidee; Suphatsara Waisunee; Chaiwat Poondee; Kanyarat Nitchoho
Source: check_circle
DataCite

Blockchain-Based Supply Chain System-A Proof of Concept for the Coffee Industry

OpenAlex
2024-01-12 | Other
Contributors: Sirapat Boonkrong; Kittipop Srakhatong; Pongsakorn Lanjaidee; Suphatsara Waisunee; Chaiwat Poondee; Kanyarat Nitchoho
Source: check_circle
DataCite

Blockchain-Based Supply Chain System-A Proof of Concept for the Coffee Industry

2024-01-12 | Conference paper
Contributors: Sirapat Boonkrong; Kittipop Srakhatong; Phongsakorn Lanjaidee; Suphatsara Waisunee; Chaiwat Poondee; Kanyarat Nitchoho
Source: check_circle
Crossref

Password Strength Metre Application

International Journal of Interactive Mobile Technologies
2021 | Journal article
EID:

2-s2.0-85112811195

Part of ISSN: 18657923
Contributors: Boonkrong, S.; Kitthimon, A.; Koksoungnoen, P.; Jenprakhon, K.
Source: Self-asserted source
Sirapat Boonkrong via Scopus - Elsevier

An analysis of numerical grid-based authentication

ACM International Conference Proceeding Series
2019 | Conference paper
EID:

2-s2.0-85074276797

Contributors: Boonkrong, S.
Source: Self-asserted source
Sirapat Boonkrong via Scopus - Elsevier

Finding a suitable threshold value for an iris-based authentication system

International Journal of Electrical and Computer Engineering
2019 | Journal article
EID:

2-s2.0-85067342741

Part of ISSN: 20888708
Contributors: Wangkeeree, N.; Boonkrong, S.
Source: Self-asserted source
Sirapat Boonkrong via Scopus - Elsevier

Inferring online relationships from user characteristics

Walailak Journal of Science and Technology
2019 | Journal article
EID:

2-s2.0-85067107756

Part of ISSN: 2228835X 16863933
Contributors: Vongsingthong, S.; Boonkrong, S.; Unger, H.
Source: Self-asserted source
Sirapat Boonkrong via Scopus - Elsevier

Security analysis and improvement of a multi-factor biometric-based remote authentication scheme

IAENG International Journal of Computer Science
2019 | Journal article
EID:

2-s2.0-85077145619

Part of ISSN: 18199224 1819656X
Contributors: Boonkrong, S.
Source: Self-asserted source
Sirapat Boonkrong via Scopus - Elsevier

An analysis of graph properties for detecting sybil nodes in social networks

Journal of ICT Research and Applications
2018 | Journal article
EID:

2-s2.0-85058526441

Part of ISSN: 23375787
Contributors: Kaewking, K.; Boonkrong, S.
Source: Self-asserted source
Sirapat Boonkrong via Scopus - Elsevier

Modeling network evolution by colored petri nets

Walailak Journal of Science and Technology
2018 | Journal article
EID:

2-s2.0-85037131364

Part of ISSN: 2228835X 16863933
Contributors: Vongsingthong, S.; Boonkrong, S.; Unger, H.
Source: Self-asserted source
Sirapat Boonkrong via Scopus - Elsevier

Cryptanalysis of a Multi-factor Biometric-Based Remote Authentication Scheme

Recent Advances in Information and Communication Technology 2018
2018-06 | Other
Part of ISBN: 9783319936918
Part of ISSN: 2194-5357
Contributors: Sirapat Boonkrong
Source: Self-asserted source
Sirapat Boonkrong via Crossref Metadata Search
grade
Preferred source (of 2)‎

Internet banking login with multi-factor authentication

KSII Transactions on Internet and Information Systems
2017 | Journal article
EID:

2-s2.0-85011072444

Contributors: Boonkrong, S.
Source: Self-asserted source
Sirapat Boonkrong via Scopus - Elsevier

Modeling dynamic network structure in social networks

Proceedings of the 3rd International Conference on Communication and Information Processing - ICCIP '17
2017 | Conference paper
Part of ISBN: 9781450353656
Contributors: Suwimon Vongsingthong; Sirapat Boonkrong; Herwig Unger
Source: Self-asserted source
Sirapat Boonkrong via Crossref Metadata Search
grade
Preferred source (of 2)‎

Dynamic salt generating scheme using seeds warehouse table coordinates

2015 IEEE 2nd International Conference on InformationScience and Security, ICISS 2015
2016 | Conference paper
EID:

2-s2.0-84964664278

Contributors: Zhang, J.; Boonkrong, S.
Source: Self-asserted source
Sirapat Boonkrong via Scopus - Elsevier

Dynamic salt generation and placement for secure password storing

IAENG International Journal of Computer Science
2016 | Journal article
EID:

2-s2.0-84962905493

Contributors: Boonkrong, S.; Somboonpattanakit, C.
Source: Self-asserted source
Sirapat Boonkrong via Scopus - Elsevier

Finding an optimal parameter for threshold cryptography

Advances in Intelligent Systems and Computing
2016 | Book
EID:

2-s2.0-84976509412

Contributors: Janratchakool, W.; Boonkrong, S.; Smanchat, S.
Source: Self-asserted source
Sirapat Boonkrong via Scopus - Elsevier
grade
Preferred source (of 2)‎

Finding the optimal value for threshold cryptography on cloud computing

International Journal of Electrical and Computer Engineering
2016 | Journal article
EID:

2-s2.0-85011961704

Contributors: Janratchakool, W.; Boonkrong, S.; Smanchat, S.
Source: Self-asserted source
Sirapat Boonkrong via Scopus - Elsevier

Preface

Advances in Intelligent Systems and Computing
2016 | Book
EID:

2-s2.0-84976471129

Part of ISSN: 21945357
Contributors: Meesad, P.; Boonkrong, S.; Unger, H.
Source: Self-asserted source
Sirapat Boonkrong via Scopus - Elsevier

Analysis of Organizational Vulnerability using Social Network Analysis and Attack Graph

GSTF Journal on Computing (JoC)
2016-09 | Journal article
Contributors: Supachai Kanchanapokin; Sirapat Boonkrong
Source: Self-asserted source
Sirapat Boonkrong via Crossref Metadata Search

A survey on smartphone authentication

Walailak Journal of Science and Technology
2015 | Journal article
EID:

2-s2.0-84920939071

Contributors: Vongsingthong, S.; Boonkrong, S.
Source: Self-asserted source
Sirapat Boonkrong via Scopus - Elsevier

Exploring Bad Behaviors from Email Logs

Information Science and Applications
2015 | Other
Contributors: Supachai Kanchanapokin; Sirapat Boonkrong
Source: Self-asserted source
Sirapat Boonkrong via Crossref Metadata Search
grade
Preferred source (of 2)‎

On the Distributions of User Behaviors in Complex Online Social Networks

Recent Advances in Information and Communication Technology 2015
2015 | Other
Contributors: Suwimon Vongsingthong; Sirapat Boonkrong; Mario Kubek; Herwig Unger
Source: Self-asserted source
Sirapat Boonkrong via Crossref Metadata Search
grade
Preferred source (of 2)‎

Reducing battery consumption of data polling and pushing techniques on Android using GZip

Proceedings - 2015 7th International Conference on Information Technology and Electrical Engineering: Envisioning the Trend of Computer, Information and Engineering, ICITEE 2015
2015 | Conference paper
EID:

2-s2.0-84966480012

Contributors: Boonkrong, S.; Dinh, P.C.
Source: Self-asserted source
Sirapat Boonkrong via Scopus - Elsevier

Social network monitoring application for parents with children under thirteen

Proceedings of the 2015-7th International Conference on Knowledge and Smart Technology, KST 2015
2015 | Conference paper
EID:

2-s2.0-84925858534

Contributors: Santisarun, P.; Boonkrong, S.
Source: Self-asserted source
Sirapat Boonkrong via Scopus - Elsevier

Improving Security with Two-factor Authentication Using Image

KMUTNB International Journal of Applied Science and Technology
2015-02-02 | Journal article
Contributors: Supakit Mahitthiburin; Sirapat Boonkrong
Source: Self-asserted source
Sirapat Boonkrong via Crossref Metadata Search

A Comparison of Efficiency of Data Transfer by Using Rsync, Rsync+SSH and Dropbox

International Journal of Computer Theory and Engineering
2014 | Journal article
Contributors: Wiman Banditvilai; Sirapat Boonkrong
Source: Self-asserted source
Sirapat Boonkrong via Crossref Metadata Search

Efficiency improvement of outbound call route selection on IP-PBX using KNN with USSD

Research Journal of Applied Sciences
2014 | Journal article
EID:

2-s2.0-84908219654

Contributors: Suwannaraj, K.; Boonkrong, S.
Source: Self-asserted source
Sirapat Boonkrong via Scopus - Elsevier

Preface

Advances in Intelligent Systems and Computing
2014 | Book
EID:

2-s2.0-84906852798

Part of ISSN: 21945357
Contributors: Boonkrong, S.; Unger, H.; Meesad, P.
Source: Self-asserted source
Sirapat Boonkrong via Scopus - Elsevier

Recent Advances in Information and Communication Technology: Proceedings of the 10th International Conference on Computing and Information Technology (IC<sup>2</sup>IT2014)

Advances in Intelligent Systems and Computing
2014 | Book
EID:

2-s2.0-84906860644

Part of ISSN: 21945357
Contributors: Boonkrong, S.; Unger, H.; Meesad, P.
Source: Self-asserted source
Sirapat Boonkrong via Scopus - Elsevier

A Step towards a Solution to Information Privacy Problem on Online Social Networks

GSTF Journal on Computing (JoC)
2013 | Journal article
Source: Self-asserted source
Sirapat Boonkrong

Advances in Intelligent Systems and Computing: Preface

Advances in Intelligent Systems and Computing
2013 | Book
EID:

2-s2.0-84876227865

Part of ISSN: 21945357
Contributors: Meesad, P.; Unger, H.; Boonkrong, S.
Source: Self-asserted source
Sirapat Boonkrong via Scopus - Elsevier

Outbound Call Route Selection on IP-PBX Using Unstructured Supplementary Service Data

The 9th International Conference on Computing and InformationTechnology (IC2IT2013)
2013 | Other
Contributors: Kittipong Suwannaraj; Sirapat Boonkrong
Source: Self-asserted source
Sirapat Boonkrong via Crossref Metadata Search
grade
Preferred source (of 2)‎

The Comparison of Impacts to Android Phone Battery Between Polling Data and Pushing data

IISRO Multi-Conferences Proceeding. Thailand
2013 | Conference paper
Source: Self-asserted source
Sirapat Boonkrong

A more secure and efficient Andrew Secure RPC protocol

Security and Communication Networks
2013-11 | Journal article
Contributors: Sirapat Boonkrong
Source: Self-asserted source
Sirapat Boonkrong via Crossref Metadata Search
grade
Preferred source (of 2)‎

Security of Passwords

Information Technology Journal
2012 | Journal article
Source: Self-asserted source
Sirapat Boonkrong

The Number of Keys Needed for Secure Sharing on Social Networks

Conference Proceedings on 3rd Annual International Conference on Infocomm Technologies in Competitive Strategies
2012-09 | Conference paper
Contributors: Sirapat Boonkrong
Source: Self-asserted source
Sirapat Boonkrong via Crossref Metadata Search

Some Remarks on Andrew Secure RPC

10th International Conference on Innovative Internet Community Services
2010 | Conference paper
Source: Self-asserted source
Sirapat Boonkrong

Authentication, Pre-handoff and Handoff in Pure MANET

2006 | Journal article
Source: Self-asserted source
Sirapat Boonkrong

Authentication in Mobile Ad Hoc Networks

Proceeding of the 1st Thailand Computer Science Conference
2004 | Conference paper
Source: Self-asserted source
Sirapat Boonkrong

Peer review (18 reviews for 4 publications/grants)

Review activity for Education and information technologies. (8)
Review activity for International journal of ITS research. (1)
Review activity for Journal of ambient intelligence & humanized computing (1)
Review activity for Wireless networks. (8)