{"created":"2020-09-01T13:11:38.830428+00:00","id":3600,"links":{},"metadata":{"_buckets":{"deposit":"158d6c7a-44f2-498b-8375-d25f48318441"},"_deposit":{"id":"3600","owners":[],"pid":{"revision_id":0,"type":"recid","value":"3600"},"status":"published"},"_oai":{"id":"oai:meral.edu.mm:recid/3600","sets":["1582963302567:1597824273898"]},"communities":["ucsy"],"item_1583103067471":{"attribute_name":"Title","attribute_value_mlt":[{"subitem_1551255647225":"An Approach to Secured Documents Using Triple DES and SHA","subitem_1551255648112":"en"}]},"item_1583103085720":{"attribute_name":"Description","attribute_value_mlt":[{"interim":"Creating the common security basic is one of the most important tasks for all security system Cryptographic techniques are particularly important and indispensable components of the electronic communication system, e-government system, and other commercial system. Cryptography provides the basic for most computer mechanisms. Information security is a fundamental requirement for an operational information security, such as messages, privacy of communication and reliable authentication and information technology have set new requirements and challenges for them. The Triple Data Encryption Standard(3DES) algorithm has emerged to be the most commonly used in varying application because it is still primitives and use in the several fields of communication integrity and Signature authentication. In this paper provide Microsoft word and excel of document file that can be used to build selective data of person identifiable file. This proposed system is a data transferring system which sends encrypted selective data in a file from one place to another. This system implements 3DES and SHA-1 algorithm prove the security of word and excel file even on insecure network."}]},"item_1583103108160":{"attribute_name":"Keywords","attribute_value":[]},"item_1583103120197":{"attribute_name":"Files","attribute_type":"file","attribute_value_mlt":[{"accessrole":"open_access","date":[{"dateType":"Available","dateValue":"2019-07-25"}],"displaytype":"preview","filename":"An Approach to Secured Documents Using Triple DES and SHA.pdf","filesize":[{"value":"7 Kb"}],"format":"application/pdf","licensetype":"license_note","mimetype":"application/pdf","url":{"url":"https://meral.edu.mm/record/3600/files/An Approach to Secured Documents Using Triple DES and SHA.pdf"},"version_id":"53bab876-ce4f-4f16-9fee-abed20c6299e"}]},"item_1583103131163":{"attribute_name":"Journal articles","attribute_value_mlt":[{"subitem_issue":"","subitem_journal_title":"Sixth Local Conference on Parallel and Soft Computing","subitem_pages":"","subitem_volume":""}]},"item_1583103147082":{"attribute_name":"Conference papers","attribute_value_mlt":[{"subitem_acronym":"","subitem_c_date":"","subitem_conference_title":"","subitem_part":"","subitem_place":"","subitem_session":"","subitem_website":""}]},"item_1583103211336":{"attribute_name":"Books/reports/chapters","attribute_value_mlt":[{"subitem_book_title":"","subitem_isbn":"","subitem_pages":"","subitem_place":"","subitem_publisher":""}]},"item_1583103233624":{"attribute_name":"Thesis/dissertations","attribute_value_mlt":[{"subitem_awarding_university":"","subitem_supervisor(s)":[{"subitem_supervisor":""}]}]},"item_1583105942107":{"attribute_name":"Authors","attribute_value_mlt":[{"subitem_authors":[{"subitem_authors_fullname":"Samn, Eant Htoo"},{"subitem_authors_fullname":"Tun, Nay Min"}]}]},"item_1583108359239":{"attribute_name":"Upload type","attribute_value_mlt":[{"interim":"Publication"}]},"item_1583108428133":{"attribute_name":"Publication type","attribute_value_mlt":[{"interim":"Article"}]},"item_1583159729339":{"attribute_name":"Publication date","attribute_value":"2011-12-29"},"item_1583159847033":{"attribute_name":"Identifier","attribute_value":"http://onlineresource.ucsy.edu.mm/handle/123456789/1335"},"item_title":"An Approach to Secured Documents Using Triple DES and SHA","item_type_id":"21","owner":"1","path":["1597824273898"],"publish_date":"2019-07-25","publish_status":"0","recid":"3600","relation_version_is_last":true,"title":["An Approach to Secured Documents Using Triple DES and SHA"],"weko_creator_id":"1","weko_shared_id":-1},"updated":"2021-12-13T06:15:37.626626+00:00"}