นันทา จันทร์พิทักษ์
ผู้ช่วยศาสตราจารย์
สาขาวิชาวิศวกรรมคอมพิวเตอร์ คณะวิศวกรรมศาสตร์ ศรีราชา วิทยาเขตศรีราชา
nanta.ja@ku.ac.th
0810016767
EDUCATION
- Doctor of Philosophy (Ph.D.), King Mongkut's Institute of Technology Ladkrabang, ไทย, 2016
- Master of Science (M.Sc.), Mahanakorn University of Technology, ไทย, 2007
- Bachelor of Science (BSc), Burapha University, ไทย, 1993
RESOURCE
แหล่งที่มา
ผลงาน
Works
INTEREST
ความสนใจ
Information Security, Blockchain, Cryptography
Expertise Cloud
ความเชี่ยวชาญ
Person
Relationship
นักวิจัย
ที่มีผลงานมากที่สุด 10 คนแรก
Scopus
h-index
h-index: 3
# | Document title | Authors | Year | Source | Cited by |
---|---|---|---|---|---|
1 | Information security requirement extraction from regulatory documents using GATE/ANNIC | Janpitak N., Sathitwiriyawong C., Pipatthanaudomdee P. | 2019 | iEECON 2019 - 7th International Electrical Engineering Congress, Proceedings, 8938899 | 8 |
2 | Coin Recovery from Inaccessible Cryptocurrency Wallet Using Unspent Transaction Output | Rakdej P., Janpitak N., Warasart M., Lilakiatsakun W. | 2019 | Proceedings of 2019 4th International Conference on Information Technology: Encompassing Intelligent Technology and Innovation Towards the New Era of Human Life, InCIT 2019, pp. 99-103, 8911915 | 4 |
3 | Run-time enforcement model for dynamic separation of duty | Janpitak N., Sathitwiriyawong C. | 2010 | ISCIT 2010 - 2010 10th International Symposium on Communications and Information Technologies, pp. 115-120, 5664902 | 3 |
4 | The novel secure testament methodology for cryptocurrency wallet using mnemonic seed | Janpitak N., Lilakiatsakun W., Sathitwiriyawong C. | 2020 | Information Security Journal, 29(4), pp. 169-182 | 2 |
5 | A Design Of Blockchain-Based Happy Giving Application: Promoting Collaboration And Community Development | Janpitak N., Supeeson A., Pannurat N. | 2023 | 7th International Conference on Information Technology, InCIT 2023, pp. 304-308 | 1 |
6 | Automated Compliance Checking Methodology for Non-Log Operations | Janpitak N., Sathitwiriyawong C. | 2015 | Information Security Journal, 24(4-6), pp. 98-108 | 0 |