Log in
Language:

MERAL Myanmar Education Research and Learning Portal

  • Top
  • Universities
  • Ranking
To
lat lon distance
To

Field does not validate



Index Link

Index Tree

Please input email address.

WEKO

One fine body…

WEKO

One fine body…

Item

{"_buckets": {"deposit": "e1c7a0f6-3cc6-4a63-bc7c-7f1dfa38b989"}, "_deposit": {"id": "3910", "owners": [], "pid": {"revision_id": 0, "type": "recid", "value": "3910"}, "status": "published"}, "_oai": {"id": "oai:meral.edu.mm:recid/3910", "sets": ["user-ucsy"]}, "communities": ["ucsy"], "item_1583103067471": {"attribute_name": "Title", "attribute_value_mlt": [{"subitem_1551255647225": "Arrangement of Secure Examination Questions based on ElGamal Algorithm", "subitem_1551255648112": "en"}]}, "item_1583103085720": {"attribute_name": "Description", "attribute_value_mlt": [{"interim": "The data security is useful not only for strong andcommunication data in secret but also for ensuring that thesource of the message is valid and that the message has notbeen altered. Cryptography was created as a technique forsecuring the secrecy of communication and many differentmethods have been developed to encrypt and decrypt data inorder to keep the message secret. There are different types ofencryption algorithms used to protect sensitive data includingsymmetric, asymmetric encryption techniques. In this paper,each department makes sample questions and encrypt samplequestions and send to the exam authorized group. Theauthorized group save encrypted questions to the database andtake one questions from the database by random. The examauthorized group decrypts the question and distribute plain textquestion. This paper implements a security system that providesarrangement of secure examination questions by using ElgamalAlgorithm."}]}, "item_1583103108160": {"attribute_name": "Keywords", "attribute_value": []}, "item_1583103120197": {"attribute_name": "Files", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_access", "date": [{"dateType": "Available", "dateValue": "2019-08-02"}], "displaytype": "preview", "download_preview_message": "", "file_order": 0, "filename": "Arrangement of Secure Examination Questions based on ElGamal Algorithm.pdf", "filesize": [{"value": "11 Kb"}], "format": "application/pdf", "future_date_message": "", "is_thumbnail": false, "licensetype": "license_free", "mimetype": "application/pdf", "size": 11000.0, "url": {"url": "https://meral.edu.mm/record/3910/files/Arrangement of Secure Examination Questions based on ElGamal Algorithm.pdf"}, "version_id": "615976cd-33c4-43c5-8919-17e6f522e74d"}]}, "item_1583103131163": {"attribute_name": "Journal articles", "attribute_value_mlt": [{"subitem_issue": "", "subitem_journal_title": "Third Local Conference on Parallel and Soft Computing", "subitem_pages": "", "subitem_volume": ""}]}, "item_1583103147082": {"attribute_name": "Conference papers", "attribute_value_mlt": [{"subitem_acronym": "", "subitem_c_date": "", "subitem_conference_title": "", "subitem_part": "", "subitem_place": "", "subitem_session": "", "subitem_website": ""}]}, "item_1583103211336": {"attribute_name": "Books/reports/chapters", "attribute_value_mlt": [{"subitem_book_title": "", "subitem_isbn": "", "subitem_pages": "", "subitem_place": "", "subitem_publisher": ""}]}, "item_1583103233624": {"attribute_name": "Thesis/dissertations", "attribute_value_mlt": [{"subitem_awarding_university": "", "subitem_supervisor(s)": [{"subitem_supervisor": ""}]}]}, "item_1583105942107": {"attribute_name": "Authors", "attribute_value_mlt": [{"subitem_authors": [{"subitem_authors_fullname": "Oo, Hlaing Myo"}, {"subitem_authors_fullname": "Mya, Khin Than"}]}]}, "item_1583108359239": {"attribute_name": "Upload type", "attribute_value_mlt": [{"interim": "Publication"}]}, "item_1583108428133": {"attribute_name": "Publication type", "attribute_value_mlt": [{"interim": "Article"}]}, "item_1583159729339": {"attribute_name": "Publication date", "attribute_value": "2009-08-03"}, "item_1583159847033": {"attribute_name": "Identifier", "attribute_value": "http://onlineresource.ucsy.edu.mm/handle/123456789/1630"}, "item_title": "Arrangement of Secure Examination Questions based on ElGamal Algorithm", "item_type_id": "21", "owner": "1", "path": ["1597824273898"], "permalink_uri": "http://hdl.handle.net/20.500.12678/0000003910", "pubdate": {"attribute_name": "Deposited date", "attribute_value": "2019-08-02"}, "publish_date": "2019-08-02", "publish_status": "0", "recid": "3910", "relation": {}, "relation_version_is_last": true, "title": ["Arrangement of Secure Examination Questions based on ElGamal Algorithm"], "weko_shared_id": -1}
  1. University of Computer Studies, Yangon
  2. Conferences

Arrangement of Secure Examination Questions based on ElGamal Algorithm

http://hdl.handle.net/20.500.12678/0000003910
http://hdl.handle.net/20.500.12678/0000003910
91517b40-9e3f-4ac2-885a-055db83a8f4c
e1c7a0f6-3cc6-4a63-bc7c-7f1dfa38b989
None
Preview
Name / File License Actions
Arrangement Arrangement of Secure Examination Questions based on ElGamal Algorithm.pdf (11 Kb)
Back
0
0
views
downloads
See details
Views Downloads

Versions

Ver.1 2020-09-01 13:46:24.295010
Show All versions

Share

Mendeley Twitter Facebook Print Addthis

Export

OAI-PMH
  • OAI-PMH DublinCore
Other Formats
  • JSON

Confirm


Back to MERAL


Back to MERAL