Log in
Language:

MERAL Myanmar Education Research and Learning Portal

  • Top
  • Universities
  • Ranking
To
lat lon distance
To

Field does not validate



Index Link

Index Tree

Please input email address.

WEKO

One fine body…

WEKO

One fine body…

Item

{"_buckets": {"deposit": "3109161d-27c1-4a95-a2db-6b56fbad79f0"}, "_deposit": {"id": "3816", "owners": [], "pid": {"revision_id": 0, "type": "recid", "value": "3816"}, "status": "published"}, "_oai": {"id": "oai:meral.edu.mm:recid/3816", "sets": ["user-ucsy"]}, "communities": ["ucsy"], "item_1583103067471": {"attribute_name": "Title", "attribute_value_mlt": [{"subitem_1551255647225": "Providing Data Integrity and Authentication using RSA Digital Signature and MD5 Hash Algorithm", "subitem_1551255648112": "en"}]}, "item_1583103085720": {"attribute_name": "Description", "attribute_value_mlt": [{"interim": "This paper presents how to get data integrity and authentication in receiver. Signing process is performed in sender and verifying process is performed in receiver. In signing process, sender computes hash value of message/file. The output is unique hash value. Sender encrypts this unique hash value with sender’s private key. The output is digital signature. And then, sender sends original message/file and it’s signature to receiver. In verifying process, receiver decrypts the signature with sender’s public key. The output is unique hash value. And receiver computes hash value of original message/file. If two hash values are equal, the content of message/file is not modified after signed and was sent by valid sender. If two hash values are not equal, the content of message/file is modified after signed and was sent by invalid sender."}]}, "item_1583103108160": {"attribute_name": "Keywords", "attribute_value": []}, "item_1583103120197": {"attribute_name": "Files", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_access", "date": [{"dateType": "Available", "dateValue": "2019-07-31"}], "displaytype": "preview", "download_preview_message": "", "file_order": 0, "filename": "54134.pdf", "filesize": [{"value": "537 Kb"}], "format": "application/pdf", "future_date_message": "", "is_thumbnail": false, "licensetype": "license_free", "mimetype": "application/pdf", "size": 537000.0, "url": {"url": "https://meral.edu.mm/record/3816/files/54134.pdf"}, "version_id": "7e123852-af85-4803-964a-95e1959559a4"}]}, "item_1583103131163": {"attribute_name": "Journal articles", "attribute_value_mlt": [{"subitem_issue": "", "subitem_journal_title": "Fourth Local Conference on Parallel and Soft Computing", "subitem_pages": "", "subitem_volume": ""}]}, "item_1583103147082": {"attribute_name": "Conference papers", "attribute_value_mlt": [{"subitem_acronym": "", "subitem_c_date": "", "subitem_conference_title": "", "subitem_part": "", "subitem_place": "", "subitem_session": "", "subitem_website": ""}]}, "item_1583103211336": {"attribute_name": "Books/reports/chapters", "attribute_value_mlt": [{"subitem_book_title": "", "subitem_isbn": "", "subitem_pages": "", "subitem_place": "", "subitem_publisher": ""}]}, "item_1583103233624": {"attribute_name": "Thesis/dissertations", "attribute_value_mlt": [{"subitem_awarding_university": "", "subitem_supervisor(s)": [{"subitem_supervisor": ""}]}]}, "item_1583105942107": {"attribute_name": "Authors", "attribute_value_mlt": [{"subitem_authors": [{"subitem_authors_fullname": "Swe, Khin Thet Nwe"}]}]}, "item_1583108359239": {"attribute_name": "Upload type", "attribute_value_mlt": [{"interim": "Publication"}]}, "item_1583108428133": {"attribute_name": "Publication type", "attribute_value_mlt": [{"interim": "Article"}]}, "item_1583159729339": {"attribute_name": "Publication date", "attribute_value": "2009-12-30"}, "item_1583159847033": {"attribute_name": "Identifier", "attribute_value": "http://onlineresource.ucsy.edu.mm/handle/123456789/1544"}, "item_title": "Providing Data Integrity and Authentication using RSA Digital Signature and MD5 Hash Algorithm", "item_type_id": "21", "owner": "1", "path": ["1597824273898"], "permalink_uri": "http://hdl.handle.net/20.500.12678/0000003816", "pubdate": {"attribute_name": "Deposited date", "attribute_value": "2019-07-31"}, "publish_date": "2019-07-31", "publish_status": "0", "recid": "3816", "relation": {}, "relation_version_is_last": true, "title": ["Providing Data Integrity and Authentication using RSA Digital Signature and MD5 Hash Algorithm"], "weko_shared_id": -1}
  1. University of Computer Studies, Yangon
  2. Conferences

Providing Data Integrity and Authentication using RSA Digital Signature and MD5 Hash Algorithm

http://hdl.handle.net/20.500.12678/0000003816
http://hdl.handle.net/20.500.12678/0000003816
9ac82603-8b5d-4177-a713-e2530018ba99
3109161d-27c1-4a95-a2db-6b56fbad79f0
None
Preview
Name / File License Actions
54134.pdf 54134.pdf (537 Kb)
Back
0
0
views
downloads
See details
Views Downloads

Versions

Ver.1 2020-09-01 13:34:52.476495
Show All versions

Share

Mendeley Twitter Facebook Print Addthis

Export

OAI-PMH
  • OAI-PMH DublinCore
Other Formats
  • JSON

Confirm


Back to MERAL


Back to MERAL