Log in
Language:

MERAL Myanmar Education Research and Learning Portal

  • Top
  • Universities
  • Ranking
To
lat lon distance
To

Field does not validate



Index Link

Index Tree

Please input email address.

WEKO

One fine body…

WEKO

One fine body…

Item

{"_buckets": {"deposit": "c3136724-c511-4e63-8776-555eceb2484e"}, "_deposit": {"id": "3467", "owners": [], "pid": {"revision_id": 0, "type": "recid", "value": "3467"}, "status": "published"}, "_oai": {"id": "oai:meral.edu.mm:recid/3467", "sets": ["user-ucsy"]}, "communities": ["ucsy"], "item_1583103067471": {"attribute_name": "Title", "attribute_value_mlt": [{"subitem_1551255647225": "Implementation of E-mail Security System Using NTRU Cryptosystem and SHA-1 Algorithm", "subitem_1551255648112": "en"}]}, "item_1583103085720": {"attribute_name": "Description", "attribute_value_mlt": [{"interim": "Security of exchanging private information over a non secure channel is important in communications system. Efficient cryptographic techniques are necessary to endow the security level in mail system. Email security is needed to implement to send the message in a secure way. With no encryption email activity is plainly visible by any occasional eavesdropper. The Number Theory Research Unit (NTRU) cryptosystem becomes the fastest and smallest public key security solutions for data communication network and application. Email has become one of the most important means of communication and it is widely used all over the world in various fields. This system intends to implement the email security system by using NTRU cryptosystem to encrypt and decrypt mail message to provide security goal of confidentiality. Secure Hash Algorithm (SHA-1) is used to check the mail message integrity of this system."}]}, "item_1583103108160": {"attribute_name": "Keywords", "attribute_value_mlt": [{"interim": "Confidentiality"}, {"interim": "Email security"}, {"interim": "NTRU"}, {"interim": "PKCS"}, {"interim": "SHA-1"}]}, "item_1583103120197": {"attribute_name": "Files", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_access", "date": [{"dateType": "Available", "dateValue": "2019-07-23"}], "displaytype": "preview", "download_preview_message": "", "file_order": 0, "filename": "psc2010paper (25).pdf", "filesize": [{"value": "241 Kb"}], "format": "application/pdf", "future_date_message": "", "is_thumbnail": false, "licensetype": "license_free", "mimetype": "application/pdf", "size": 241000.0, "url": {"url": "https://meral.edu.mm/record/3467/files/psc2010paper (25).pdf"}, "version_id": "82062bd5-0b0a-448b-9392-f3e88bee7223"}]}, "item_1583103131163": {"attribute_name": "Journal articles", "attribute_value_mlt": [{"subitem_issue": "", "subitem_journal_title": "Fifth  Local Conference on Parallel and Soft Computing", "subitem_pages": "", "subitem_volume": ""}]}, "item_1583103147082": {"attribute_name": "Conference papers", "attribute_value_mlt": [{"subitem_acronym": "", "subitem_c_date": "", "subitem_conference_title": "", "subitem_part": "", "subitem_place": "", "subitem_session": "", "subitem_website": ""}]}, "item_1583103211336": {"attribute_name": "Books/reports/chapters", "attribute_value_mlt": [{"subitem_book_title": "", "subitem_isbn": "", "subitem_pages": "", "subitem_place": "", "subitem_publisher": ""}]}, "item_1583103233624": {"attribute_name": "Thesis/dissertations", "attribute_value_mlt": [{"subitem_awarding_university": "", "subitem_supervisor(s)": [{"subitem_supervisor": ""}]}]}, "item_1583105942107": {"attribute_name": "Authors", "attribute_value_mlt": [{"subitem_authors": [{"subitem_authors_fullname": "Kyi, Khin Myo"}, {"subitem_authors_fullname": "Aye, Zin May"}]}]}, "item_1583108359239": {"attribute_name": "Upload type", "attribute_value_mlt": [{"interim": "Publication"}]}, "item_1583108428133": {"attribute_name": "Publication type", "attribute_value_mlt": [{"interim": "Article"}]}, "item_1583159729339": {"attribute_name": "Publication date", "attribute_value": "2010-12-16"}, "item_1583159847033": {"attribute_name": "Identifier", "attribute_value": "http://onlineresource.ucsy.edu.mm/handle/123456789/1214"}, "item_title": "Implementation of E-mail Security System Using NTRU Cryptosystem and SHA-1 Algorithm", "item_type_id": "21", "owner": "1", "path": ["1597824273898"], "permalink_uri": "http://hdl.handle.net/20.500.12678/0000003467", "pubdate": {"attribute_name": "Deposited date", "attribute_value": "2019-07-23"}, "publish_date": "2019-07-23", "publish_status": "0", "recid": "3467", "relation": {}, "relation_version_is_last": true, "title": ["Implementation of E-mail Security System Using NTRU Cryptosystem and SHA-1 Algorithm"], "weko_shared_id": -1}
  1. University of Computer Studies, Yangon
  2. Conferences

Implementation of E-mail Security System Using NTRU Cryptosystem and SHA-1 Algorithm

http://hdl.handle.net/20.500.12678/0000003467
http://hdl.handle.net/20.500.12678/0000003467
ae5cc134-0123-4ef9-8a40-c1e8e6b7c2cc
c3136724-c511-4e63-8776-555eceb2484e
None
Preview
Name / File License Actions
psc2010paper psc2010paper (25).pdf (241 Kb)
Publication type
Article
Upload type
Publication
Title
Title Implementation of E-mail Security System Using NTRU Cryptosystem and SHA-1 Algorithm
Language en
Publication date 2010-12-16
Authors
Kyi, Khin Myo
Aye, Zin May
Description
Security of exchanging private information over a non secure channel is important in communications system. Efficient cryptographic techniques are necessary to endow the security level in mail system. Email security is needed to implement to send the message in a secure way. With no encryption email activity is plainly visible by any occasional eavesdropper. The Number Theory Research Unit (NTRU) cryptosystem becomes the fastest and smallest public key security solutions for data communication network and application. Email has become one of the most important means of communication and it is widely used all over the world in various fields. This system intends to implement the email security system by using NTRU cryptosystem to encrypt and decrypt mail message to provide security goal of confidentiality. Secure Hash Algorithm (SHA-1) is used to check the mail message integrity of this system.
Keywords
Confidentiality, Email security, NTRU, PKCS, SHA-1
Identifier http://onlineresource.ucsy.edu.mm/handle/123456789/1214
Journal articles
Fifth Local Conference on Parallel and Soft Computing
Conference papers
Books/reports/chapters
Thesis/dissertations
Back
0
0
views
downloads
See details
Views Downloads

Versions

Ver.1 2020-09-01 12:59:37.361524
Show All versions

Share

Mendeley Twitter Facebook Print Addthis

Export

OAI-PMH
  • OAI-PMH DublinCore
Other Formats
  • JSON

Confirm


Back to MERAL


Back to MERAL