Log in
Language:

MERAL Myanmar Education Research and Learning Portal

  • Top
  • Universities
  • Ranking
To
lat lon distance
To

Field does not validate



Index Link

Index Tree

Please input email address.

WEKO

One fine body…

WEKO

One fine body…

Item

{"_buckets": {"deposit": "158d6c7a-44f2-498b-8375-d25f48318441"}, "_deposit": {"id": "3600", "owners": [], "pid": {"revision_id": 0, "type": "recid", "value": "3600"}, "status": "published"}, "_oai": {"id": "oai:meral.edu.mm:recid/3600", "sets": ["user-ucsy"]}, "communities": ["ucsy"], "item_1583103067471": {"attribute_name": "Title", "attribute_value_mlt": [{"subitem_1551255647225": "An Approach to Secured Documents Using Triple DES and SHA", "subitem_1551255648112": "en"}]}, "item_1583103085720": {"attribute_name": "Description", "attribute_value_mlt": [{"interim": "Creating the common security basic is one of the most important tasks for all security system Cryptographic techniques are particularly important and indispensable components of the electronic communication system, e-government system, and other commercial system. Cryptography provides the basic for most computer mechanisms. Information security is a fundamental requirement for an operational information security, such as messages, privacy of communication and reliable authentication and information technology have set new requirements and challenges for them. The Triple Data Encryption Standard(3DES) algorithm has emerged to be the most commonly used in varying application because it is still primitives and use in the several fields of communication integrity and Signature authentication. In this paper provide Microsoft word and excel of document file that can be used to build selective data of person identifiable file. This proposed system is a data transferring system which sends encrypted selective data in a file from one place to another. This system implements 3DES and SHA-1 algorithm prove the security of word and excel file even on insecure network."}]}, "item_1583103108160": {"attribute_name": "Keywords", "attribute_value": []}, "item_1583103120197": {"attribute_name": "Files", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_access", "date": [{"dateType": "Available", "dateValue": "2019-07-25"}], "displaytype": "preview", "download_preview_message": "", "file_order": 0, "filename": "An Approach to Secured Documents Using Triple DES and SHA.pdf", "filesize": [{"value": "7 Kb"}], "format": "application/pdf", "future_date_message": "", "is_thumbnail": false, "licensetype": "license_free", "mimetype": "application/pdf", "size": 7000.0, "url": {"url": "https://meral.edu.mm/record/3600/files/An Approach to Secured Documents Using Triple DES and SHA.pdf"}, "version_id": "53bab876-ce4f-4f16-9fee-abed20c6299e"}]}, "item_1583103131163": {"attribute_name": "Journal articles", "attribute_value_mlt": [{"subitem_issue": "", "subitem_journal_title": "Sixth Local Conference on Parallel and Soft Computing", "subitem_pages": "", "subitem_volume": ""}]}, "item_1583103147082": {"attribute_name": "Conference papers", "attribute_value_mlt": [{"subitem_acronym": "", "subitem_c_date": "", "subitem_conference_title": "", "subitem_part": "", "subitem_place": "", "subitem_session": "", "subitem_website": ""}]}, "item_1583103211336": {"attribute_name": "Books/reports/chapters", "attribute_value_mlt": [{"subitem_book_title": "", "subitem_isbn": "", "subitem_pages": "", "subitem_place": "", "subitem_publisher": ""}]}, "item_1583103233624": {"attribute_name": "Thesis/dissertations", "attribute_value_mlt": [{"subitem_awarding_university": "", "subitem_supervisor(s)": [{"subitem_supervisor": ""}]}]}, "item_1583105942107": {"attribute_name": "Authors", "attribute_value_mlt": [{"subitem_authors": [{"subitem_authors_fullname": "Samn, Eant Htoo"}, {"subitem_authors_fullname": "Tun, Nay Min"}]}]}, "item_1583108359239": {"attribute_name": "Upload type", "attribute_value_mlt": [{"interim": "Publication"}]}, "item_1583108428133": {"attribute_name": "Publication type", "attribute_value_mlt": [{"interim": "Article"}]}, "item_1583159729339": {"attribute_name": "Publication date", "attribute_value": "2011-12-29"}, "item_1583159847033": {"attribute_name": "Identifier", "attribute_value": "http://onlineresource.ucsy.edu.mm/handle/123456789/1335"}, "item_title": "An Approach to Secured Documents Using Triple DES and SHA", "item_type_id": "21", "owner": "1", "path": ["1597824273898"], "permalink_uri": "http://hdl.handle.net/20.500.12678/0000003600", "pubdate": {"attribute_name": "Deposited date", "attribute_value": "2019-07-25"}, "publish_date": "2019-07-25", "publish_status": "0", "recid": "3600", "relation": {}, "relation_version_is_last": true, "title": ["An Approach to Secured Documents Using Triple DES and SHA"], "weko_shared_id": -1}
  1. University of Computer Studies, Yangon
  2. Conferences

An Approach to Secured Documents Using Triple DES and SHA

http://hdl.handle.net/20.500.12678/0000003600
http://hdl.handle.net/20.500.12678/0000003600
bd7ccce7-7f40-48b3-b897-62ca72a6d530
158d6c7a-44f2-498b-8375-d25f48318441
None
Preview
Name / File License Actions
An An Approach to Secured Documents Using Triple DES and SHA.pdf (7 Kb)
Back
0
0
views
downloads
See details
Views Downloads

Versions

Ver.1 2020-09-01 13:11:40.932444
Show All versions

Share

Mendeley Twitter Facebook Print Addthis

Export

OAI-PMH
  • OAI-PMH DublinCore
Other Formats
  • JSON

Confirm


Back to MERAL


Back to MERAL