Log in
Language:

MERAL Myanmar Education Research and Learning Portal

  • Top
  • Universities
  • Ranking
To
lat lon distance
To

Field does not validate



Index Link

Index Tree

Please input email address.

WEKO

One fine body…

WEKO

One fine body…

Item

{"_buckets": {"deposit": "5f18c160-410a-4fc7-8fe4-ffee3fc42e07"}, "_deposit": {"id": "3734", "owners": [], "pid": {"revision_id": 0, "type": "recid", "value": "3734"}, "status": "published"}, "_oai": {"id": "oai:meral.edu.mm:recid/3734", "sets": ["user-ucsy"]}, "communities": ["ucsy"], "item_1583103067471": {"attribute_name": "Title", "attribute_value_mlt": [{"subitem_1551255647225": "Information Security for Secret Data Transmission over Web Services", "subitem_1551255648112": "en"}]}, "item_1583103085720": {"attribute_name": "Description", "attribute_value_mlt": [{"interim": "Information hiding technique is becoming aresearch hotspot in information security, and will bewidely used to national security, e-commerce, egovernment,copyright protection and covertcommunication. This paper proposes secure, efficientcapacity and undetectable hiding algorithm to be usedfor XML document and the secret message is hiddenin cover XML according to the pseudorandom numbergenerator which makes this system more secured. Theproposed steganography algorithm, which is differentfrom all steganographic algorithms in XML and textfile that uses XOR logical operation and mathematicaloperation to hide secret data. All other algorithmswhich hide information by inserting white space inXML tag, rearranging the order of XML elements etc.This paper also developed a secure system in whichcryptography and steganography are used asintegrated part along with newly developed enhancedsecurity model for web services. In Steganography thesecret message is hidden in (Simple Object AccessProtocol) SOAP message according to the proposedhiding algorithm. In Cryptography public key (RSA)algorithm is used to encrypt the key for extractingprocess. This technique is empirically validated toindicate its utility and value."}]}, "item_1583103108160": {"attribute_name": "Keywords", "attribute_value": []}, "item_1583103120197": {"attribute_name": "Files", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_access", "date": [{"dateType": "Available", "dateValue": "2019-07-03"}], "displaytype": "preview", "download_preview_message": "", "file_order": 0, "filename": "12053.pdf", "filesize": [{"value": "447 Kb"}], "format": "application/pdf", "future_date_message": "", "is_thumbnail": false, "licensetype": "license_free", "mimetype": "application/pdf", "size": 447000.0, "url": {"url": "https://meral.edu.mm/record/3734/files/12053.pdf"}, "version_id": "48512b79-57ab-4a39-ac49-8b558d3e229d"}]}, "item_1583103131163": {"attribute_name": "Journal articles", "attribute_value_mlt": [{"subitem_issue": "", "subitem_journal_title": "Twelfth International Conference On Computer Applications (ICCA 2014)", "subitem_pages": "", "subitem_volume": ""}]}, "item_1583103147082": {"attribute_name": "Conference papers", "attribute_value_mlt": [{"subitem_acronym": "", "subitem_c_date": "", "subitem_conference_title": "", "subitem_part": "", "subitem_place": "", "subitem_session": "", "subitem_website": ""}]}, "item_1583103211336": {"attribute_name": "Books/reports/chapters", "attribute_value_mlt": [{"subitem_book_title": "", "subitem_isbn": "", "subitem_pages": "", "subitem_place": "", "subitem_publisher": ""}]}, "item_1583103233624": {"attribute_name": "Thesis/dissertations", "attribute_value_mlt": [{"subitem_awarding_university": "", "subitem_supervisor(s)": [{"subitem_supervisor": ""}]}]}, "item_1583105942107": {"attribute_name": "Authors", "attribute_value_mlt": [{"subitem_authors": [{"subitem_authors_fullname": "Tin, Lwin Mar"}, {"subitem_authors_fullname": "Kham, Nang Saing Moon"}]}]}, "item_1583108359239": {"attribute_name": "Upload type", "attribute_value_mlt": [{"interim": "Publication"}]}, "item_1583108428133": {"attribute_name": "Publication type", "attribute_value_mlt": [{"interim": "Article"}]}, "item_1583159729339": {"attribute_name": "Publication date", "attribute_value": "2014-02-17"}, "item_1583159847033": {"attribute_name": "Identifier", "attribute_value": "http://onlineresource.ucsy.edu.mm/handle/123456789/147"}, "item_title": "Information Security for Secret Data Transmission over Web Services", "item_type_id": "21", "owner": "1", "path": ["1597824273898"], "permalink_uri": "http://hdl.handle.net/20.500.12678/0000003734", "pubdate": {"attribute_name": "Deposited date", "attribute_value": "2019-07-03"}, "publish_date": "2019-07-03", "publish_status": "0", "recid": "3734", "relation": {}, "relation_version_is_last": true, "title": ["Information Security for Secret Data Transmission over Web Services"], "weko_shared_id": -1}
  1. University of Computer Studies, Yangon
  2. Conferences

Information Security for Secret Data Transmission over Web Services

http://hdl.handle.net/20.500.12678/0000003734
http://hdl.handle.net/20.500.12678/0000003734
76505b43-9ba6-4314-8bf9-217a8c607a15
5f18c160-410a-4fc7-8fe4-ffee3fc42e07
None
Preview
Name / File License Actions
12053.pdf 12053.pdf (447 Kb)
Back
0
0
views
downloads
See details
Views Downloads

Versions

Ver.1 2020-09-01 13:24:55.699710
Show All versions

Share

Mendeley Twitter Facebook Print Addthis

Export

OAI-PMH
  • OAI-PMH DublinCore
Other Formats
  • JSON

Confirm


Back to MERAL


Back to MERAL