{"created":"2020-09-01T13:46:41.365819+00:00","id":3916,"links":{},"metadata":{"_buckets":{"deposit":"3960a91b-e2b8-4c0a-b798-44822b66014a"},"_deposit":{"id":"3916","owners":[],"pid":{"revision_id":0,"type":"recid","value":"3916"},"status":"published"},"_oai":{"id":"oai:meral.edu.mm:recid/3916","sets":["1582963302567:1597824273898"]},"communities":["ucsy"],"item_1583103067471":{"attribute_name":"Title","attribute_value_mlt":[{"subitem_1551255647225":"Data File Encryption Scheme Using the Joint of Symmetric and Asymmetric Algorithm","subitem_1551255648112":"en"}]},"item_1583103085720":{"attribute_name":"Description","attribute_value_mlt":[{"interim":"Today, people use widely computer networks tocommunicate from one place to another. When people usecomputers, they will need necessary to protect the informationand to thwart the hackers. So, people interconnect their secretdata by using cryptographic algorithms. But the hackers try toknow the key. Therefore, the key secure important in thecryptographic system. In this paper, AES and RSA algorithmsare joined to use in the encryption and decryption. AESalgorithm is used for file encryption and RSA algorithm is usedfor key encryption. Any file is encrypted with RSA algorithmusing the receiver’s public key. This system must constructwithin the local area network (peer to peer network). It will beused for all businesses, governments, militaries and academicorganizations."}]},"item_1583103108160":{"attribute_name":"Keywords","attribute_value":[]},"item_1583103120197":{"attribute_name":"Files","attribute_type":"file","attribute_value_mlt":[{"accessrole":"open_access","date":[{"dateType":"Available","dateValue":"2019-08-02"}],"displaytype":"preview","filename":"Data File Encryption Scheme Using the Joint of Symmetric and Asymmetric Algorithm.pdf","filesize":[{"value":"10 Kb"}],"format":"application/pdf","licensetype":"license_note","mimetype":"application/pdf","url":{"url":"https://meral.edu.mm/record/3916/files/Data File Encryption Scheme Using the Joint of Symmetric and Asymmetric Algorithm.pdf"},"version_id":"e9571559-0a9a-439d-99a4-a7c21b2cea82"}]},"item_1583103131163":{"attribute_name":"Journal articles","attribute_value_mlt":[{"subitem_issue":"","subitem_journal_title":"Third Local Conference on Parallel and Soft Computing","subitem_pages":"","subitem_volume":""}]},"item_1583103147082":{"attribute_name":"Conference papers","attribute_value_mlt":[{"subitem_acronym":"","subitem_c_date":"","subitem_conference_title":"","subitem_part":"","subitem_place":"","subitem_session":"","subitem_website":""}]},"item_1583103211336":{"attribute_name":"Books/reports/chapters","attribute_value_mlt":[{"subitem_book_title":"","subitem_isbn":"","subitem_pages":"","subitem_place":"","subitem_publisher":""}]},"item_1583103233624":{"attribute_name":"Thesis/dissertations","attribute_value_mlt":[{"subitem_awarding_university":"","subitem_supervisor(s)":[{"subitem_supervisor":""}]}]},"item_1583105942107":{"attribute_name":"Authors","attribute_value_mlt":[{"subitem_authors":[{"subitem_authors_fullname":"Khin, KayKay Thi Wut Hmone"},{"subitem_authors_fullname":"Oo, Lwin Lwin"}]}]},"item_1583108359239":{"attribute_name":"Upload type","attribute_value_mlt":[{"interim":"Publication"}]},"item_1583108428133":{"attribute_name":"Publication type","attribute_value_mlt":[{"interim":"Article"}]},"item_1583159729339":{"attribute_name":"Publication date","attribute_value":"2009-08-03"},"item_1583159847033":{"attribute_name":"Identifier","attribute_value":"http://onlineresource.ucsy.edu.mm/handle/123456789/1636"},"item_title":"Data File Encryption Scheme Using the Joint of Symmetric and Asymmetric Algorithm","item_type_id":"21","owner":"1","path":["1597824273898"],"publish_date":"2019-08-02","publish_status":"0","recid":"3916","relation_version_is_last":true,"title":["Data File Encryption Scheme Using the Joint of Symmetric and Asymmetric Algorithm"],"weko_creator_id":"1","weko_shared_id":-1},"updated":"2021-12-13T01:16:00.171807+00:00"}