Log in
Language:

MERAL Myanmar Education Research and Learning Portal

  • Top
  • Universities
  • Ranking
To
lat lon distance
To

Field does not validate



Index Link

Index Tree

Please input email address.

WEKO

One fine body…

WEKO

One fine body…

Item

{"_buckets": {"deposit": "02bc8de5-1383-4893-9c93-f7adc2e2fb69"}, "_deposit": {"id": "3837", "owners": [], "pid": {"revision_id": 0, "type": "recid", "value": "3837"}, "status": "published"}, "_oai": {"id": "oai:meral.edu.mm:recid/3837", "sets": ["user-ucsy"]}, "communities": ["ucsy"], "item_1583103067471": {"attribute_name": "Title", "attribute_value_mlt": [{"subitem_1551255647225": "Implementation and Comparison of Symmetric Key Crypto System", "subitem_1551255648112": "en"}]}, "item_1583103085720": {"attribute_name": "Description", "attribute_value_mlt": [{"interim": "In the world of today, computer and Internet have become part of our everyday lives. Security for data and information are very important. Secure communication is an intrinsic requirement for many popular online transactions such as e-commerce, stock trading and banking. These transactions employ a combination of public-key and symmetric key cryptography to authenticate participants and guarantee the integrity and confidentiality of information in transit. Data confidentiality and authentication are normally provided using cryptographic techniques. Cryptography is either based on symmetric keys or asymmetric keys. This system intends to analyze and implement the most popular symmetric cryptographic algorithms Data Encryption Standard, Advanced Encryption Standard, International Data Encryption Algorithm and RC4. Based on implementation and study, runtime comparison between the symmetric cryptosystems has been made."}]}, "item_1583103108160": {"attribute_name": "Keywords", "attribute_value": []}, "item_1583103120197": {"attribute_name": "Files", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_access", "date": [{"dateType": "Available", "dateValue": "2019-07-31"}], "displaytype": "preview", "download_preview_message": "", "file_order": 0, "filename": "54156.pdf", "filesize": [{"value": "353 Kb"}], "format": "application/pdf", "future_date_message": "", "is_thumbnail": false, "licensetype": "license_free", "mimetype": "application/pdf", "size": 353000.0, "url": {"url": "https://meral.edu.mm/record/3837/files/54156.pdf"}, "version_id": "64bd210a-06c3-4e66-bab4-c9bcb4b58366"}]}, "item_1583103131163": {"attribute_name": "Journal articles", "attribute_value_mlt": [{"subitem_issue": "", "subitem_journal_title": "Fourth Local Conference on Parallel and Soft Computing", "subitem_pages": "", "subitem_volume": ""}]}, "item_1583103147082": {"attribute_name": "Conference papers", "attribute_value_mlt": [{"subitem_acronym": "", "subitem_c_date": "", "subitem_conference_title": "", "subitem_part": "", "subitem_place": "", "subitem_session": "", "subitem_website": ""}]}, "item_1583103211336": {"attribute_name": "Books/reports/chapters", "attribute_value_mlt": [{"subitem_book_title": "", "subitem_isbn": "", "subitem_pages": "", "subitem_place": "", "subitem_publisher": ""}]}, "item_1583103233624": {"attribute_name": "Thesis/dissertations", "attribute_value_mlt": [{"subitem_awarding_university": "", "subitem_supervisor(s)": [{"subitem_supervisor": ""}]}]}, "item_1583105942107": {"attribute_name": "Authors", "attribute_value_mlt": [{"subitem_authors": [{"subitem_authors_fullname": "Zar, Aung Yar"}]}]}, "item_1583108359239": {"attribute_name": "Upload type", "attribute_value_mlt": [{"interim": "Publication"}]}, "item_1583108428133": {"attribute_name": "Publication type", "attribute_value_mlt": [{"interim": "Article"}]}, "item_1583159729339": {"attribute_name": "Publication date", "attribute_value": "2009-12-30"}, "item_1583159847033": {"attribute_name": "Identifier", "attribute_value": "http://onlineresource.ucsy.edu.mm/handle/123456789/1563"}, "item_title": "Implementation and Comparison of Symmetric Key Crypto System", "item_type_id": "21", "owner": "1", "path": ["1597824273898"], "permalink_uri": "http://hdl.handle.net/20.500.12678/0000003837", "pubdate": {"attribute_name": "Deposited date", "attribute_value": "2019-07-31"}, "publish_date": "2019-07-31", "publish_status": "0", "recid": "3837", "relation": {}, "relation_version_is_last": true, "title": ["Implementation and Comparison of Symmetric Key Crypto System"], "weko_shared_id": -1}
  1. University of Computer Studies, Yangon
  2. Conferences

Implementation and Comparison of Symmetric Key Crypto System

http://hdl.handle.net/20.500.12678/0000003837
http://hdl.handle.net/20.500.12678/0000003837
efd7806f-727f-418e-9fb4-03458a881762
02bc8de5-1383-4893-9c93-f7adc2e2fb69
None
Preview
Name / File License Actions
54156.pdf 54156.pdf (353 Kb)
Back
0
0
views
downloads
See details
Views Downloads

Versions

Ver.1 2020-09-01 13:37:51.303957
Show All versions

Share

Mendeley Twitter Facebook Print Addthis

Export

OAI-PMH
  • OAI-PMH DublinCore
Other Formats
  • JSON

Confirm


Back to MERAL


Back to MERAL