Log in
Language:

MERAL Myanmar Education Research and Learning Portal

  • Top
  • Universities
  • Ranking
To
lat lon distance
To

Field does not validate



Index Link

Index Tree

Please input email address.

WEKO

One fine body…

WEKO

One fine body…

Item

{"_buckets": {"deposit": "50504f7f-e222-46af-8d2f-ad4a0b557149"}, "_deposit": {"id": "3274", "owners": [], "pid": {"revision_id": 0, "type": "recid", "value": "3274"}, "status": "published"}, "_oai": {"id": "oai:meral.edu.mm:recid/3274", "sets": ["user-ucsy"]}, "communities": ["ucsy"], "item_1583103067471": {"attribute_name": "Title", "attribute_value_mlt": [{"subitem_1551255647225": "Secure Message Transmission over Wireless Network by Using Android Application", "subitem_1551255648112": "en"}]}, "item_1583103085720": {"attribute_name": "Description", "attribute_value_mlt": [{"interim": "The security of data transmitted overwireless network of passive scanning is ofincreased interest.Sending data and messages are one of the popularways of communication.As sending data andmessages through mobile is now widely used as abusiness tool; its security has become a majorconcern for business organization andcustomers.When confidential information isexchanged using messages, DoS attack as well asto ensure that the messages are sent by authorizedsenders.Encryption mechanisms securely transmitmessage over insecure networks. In this system,for security purpose messages is encrypted usingpassword-based 128-bit AES (AdvancedEncryption Standard) encryption on androidapplication and calculate RTT (Round Trip Time)between the sender and receiver sides before thedata is transmitted over the network. There is aneed for an end to end data encryption in order toprovide a secure message for communication.Formultiple accesses, the server only accepts theclients with the permitted MAC addresses toprevent unauthorized access in wireless networkcommunity."}]}, "item_1583103108160": {"attribute_name": "Keywords", "attribute_value": []}, "item_1583103120197": {"attribute_name": "Files", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_access", "date": [{"dateType": "Available", "dateValue": "2019-07-19"}], "displaytype": "preview", "download_preview_message": "", "file_order": 0, "filename": "173_PDFsam_PSC_final proof.pdf", "filesize": [{"value": "137 Kb"}], "format": "application/pdf", "future_date_message": "", "is_thumbnail": false, "licensetype": "license_free", "mimetype": "application/pdf", "size": 137000.0, "url": {"url": "https://meral.edu.mm/record/3274/files/173_PDFsam_PSC_final proof.pdf"}, "version_id": "156a5149-7df4-4d1d-a63e-4934aa9f18d4"}]}, "item_1583103131163": {"attribute_name": "Journal articles", "attribute_value_mlt": [{"subitem_issue": "", "subitem_journal_title": "Eighth Local Conference on Parallel and Soft Computing", "subitem_pages": "", "subitem_volume": ""}]}, "item_1583103147082": {"attribute_name": "Conference papers", "attribute_value_mlt": [{"subitem_acronym": "", "subitem_c_date": "", "subitem_conference_title": "", "subitem_part": "", "subitem_place": "", "subitem_session": "", "subitem_website": ""}]}, "item_1583103211336": {"attribute_name": "Books/reports/chapters", "attribute_value_mlt": [{"subitem_book_title": "", "subitem_isbn": "", "subitem_pages": "", "subitem_place": "", "subitem_publisher": ""}]}, "item_1583103233624": {"attribute_name": "Thesis/dissertations", "attribute_value_mlt": [{"subitem_awarding_university": "", "subitem_supervisor(s)": [{"subitem_supervisor": ""}]}]}, "item_1583105942107": {"attribute_name": "Authors", "attribute_value_mlt": [{"subitem_authors": [{"subitem_authors_fullname": "Nyo, Mi Than Than"}, {"subitem_authors_fullname": "Aye, Zin May"}]}]}, "item_1583108359239": {"attribute_name": "Upload type", "attribute_value_mlt": [{"interim": "Publication"}]}, "item_1583108428133": {"attribute_name": "Publication type", "attribute_value_mlt": [{"interim": "Article"}]}, "item_1583159729339": {"attribute_name": "Publication date", "attribute_value": "2017-12-27"}, "item_1583159847033": {"attribute_name": "Identifier", "attribute_value": "http://onlineresource.ucsy.edu.mm/handle/123456789/1040"}, "item_title": "Secure Message Transmission over Wireless Network by Using Android Application", "item_type_id": "21", "owner": "1", "path": ["1597824273898"], "permalink_uri": "http://hdl.handle.net/20.500.12678/0000003274", "pubdate": {"attribute_name": "Deposited date", "attribute_value": "2019-07-19"}, "publish_date": "2019-07-19", "publish_status": "0", "recid": "3274", "relation": {}, "relation_version_is_last": true, "title": ["Secure Message Transmission over Wireless Network by Using Android Application"], "weko_shared_id": -1}
  1. University of Computer Studies, Yangon
  2. Conferences

Secure Message Transmission over Wireless Network by Using Android Application

http://hdl.handle.net/20.500.12678/0000003274
http://hdl.handle.net/20.500.12678/0000003274
bee52423-b1c2-44a1-899a-11b3207d8dad
50504f7f-e222-46af-8d2f-ad4a0b557149
None
Preview
Name / File License Actions
173_PDFsam_PSC_final 173_PDFsam_PSC_final proof.pdf (137 Kb)
Back
0
0
views
downloads
See details
Views Downloads

Versions

Ver.1 2020-09-01 09:52:20.239756
Show All versions

Share

Mendeley Twitter Facebook Print Addthis

Export

OAI-PMH
  • OAI-PMH DublinCore
Other Formats
  • JSON

Confirm


Back to MERAL


Back to MERAL