• English
    • ไทย
  • English 
    • English
    • ไทย
  • Login
Search 
  •   Wisdom Repository Home
  • หน่วยงาน
  • สำนักบรรณสารการพัฒนา
  • Search
  •   Wisdom Repository Home
  • หน่วยงาน
  • สำนักบรรณสารการพัฒนา
  • Search
JavaScript is disabled for your browser. Some features of this site may not work without it.

Browse

All of Wisdom RepositoryCommunities & CollectionsBy Issue DateAuthorsTitlesSubjectsBy Submit DateResource TypesThis CommunityBy Issue DateAuthorsTitlesSubjectsBy Submit DateResource Types

My Account

Login

Discover

AuthorNantapong Keandoungchun (1)Poonsuk Ponpurmpoon (1)SAITULAA NARANONG (1)ปิยะดนัย อานทอง (1)Subject
Computer Science (4)
Elliptic curve cryptography (1)Elliptic Curve Digital Signature Algorithm (1)grayscale images (1)identity-based cryptosystems (1)image steganography (1)Journal Article (1)Multi-Layer LDA (1)Multi-Layer Topic Model (1)Natural language processing (1)... View More

Search

Show Advanced FiltersHide Advanced Filters

Filters

Use filters to refine the search results.

Now showing items 1-4 of 4

  • Sort Options:
  • Relevance
  • Title Asc
  • Title Desc
  • Issue Date Asc
  • Issue Date Desc
  • Results Per Page:
  • 5
  • 10
  • 20
  • 40
  • 60
  • 80
  • 100
Thumbnail

Untitled 

Poonsuk Ponpurmpoon; Ohm Sornil
ID-based cryptosystems (IBCs) allow the use of publicly identifiable information in public encryption keys, which reduces the overhead of certificate management and eliminates the need for a certificate authority in the ...
Thumbnail

Untitled 

Nantapong Keandoungchun; Nithinant Thammakoranonta
Typically, an academic writing style for journals is complicated because those journals use complex vocabularies and sentences. It might be hard for students to read journal articles in detail and in short periods of time. ...
Thumbnail

Untitled 

ปิยะดนัย อานทอง; วรพล พงษ์เพ็ชร
Anti-Money Laundering Act, B.E. 2542 mainly focuses on protecting the right of an damaged persons caused by the predicate offence, but the Act hasn’t yet determined the meaning of an damaged persons, so there is no clearly ...
Thumbnail

Untitled 

SAITULAA NARANONG; Surapong Auwatanamongkol
The field of steganography deals with the encoding of hidden messages into other data, called the cover, in a manner that makes it non-obvious that a hidden message exists. Though steganography does not necessarily, on its ...

Except where otherwise noted, content on this site is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International license.

Copyright © National Institute of Development Administration | สถาบันบัณฑิตพัฒนบริหารศาสตร์
Library and Information Center | สำนักบรรณสารการพัฒนา
Email: NIDAWR@nida.ac.th    Chat: Facebook Messenger    Facebook: NIDAWisdomRepository
 

 

Except where otherwise noted, content on this site is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International license.

Copyright © National Institute of Development Administration | สถาบันบัณฑิตพัฒนบริหารศาสตร์
Library and Information Center | สำนักบรรณสารการพัฒนา
Email: NIDAWR@nida.ac.th    Chat: Facebook Messenger    Facebook: NIDAWisdomRepository
 

 

‹›×