Privacy Threats and Privacy Preservation Techniques for Farmer Data Collections Based on Data Shuffling

Surapon Riyana, Nobutaka Ito, Tatsanee Chaiya, Uthaiwan Sriwichai, Natthawud Dussadee, Tanate Chaichana, Rittichai Assawarachan, Thongchai Maneechukate, Samerkhwan Tantikul, Noppamas Riyana

289 - 301

Incident Detection Techniques for the Thai language on Twitter

Korn Puangnak, Natworapol Rachsiriwatcharabul

313 - 323

Hybrid Visual and Optimal Elliptic Curve Cryptography for Medical Image Security in Iot

L. Ashok Kumar, Sumit Srivastava, Balaji S. R., Francis H Shajin, P. Rajesh

324 - 337

High-speed Firewall Rule Verification Technique Improves Throughput Performance for IP Version 6

Suchart Khummanee, Umaporn Saisangchan, Kritsanapong Somsuk, Sarutte Atsawaraungsuk

338 - 351