Log in
Language:

MERAL Myanmar Education Research and Learning Portal

  • Top
  • Universities
  • Ranking
To
lat lon distance
To

Field does not validate



Index Link

Index Tree

Please input email address.

WEKO

One fine body…

WEKO

One fine body…

Item

{"_buckets": {"deposit": "560847f3-fb13-4a16-9fa5-d21858944cf9"}, "_deposit": {"id": "3922", "owners": [], "pid": {"revision_id": 0, "type": "recid", "value": "3922"}, "status": "published"}, "_oai": {"id": "oai:meral.edu.mm:recid/3922", "sets": ["user-ucsy"]}, "communities": ["ucsy"], "item_1583103067471": {"attribute_name": "Title", "attribute_value_mlt": [{"subitem_1551255647225": "Distributed Authentication Using Public Key Cryptography", "subitem_1551255648112": "en"}]}, "item_1583103085720": {"attribute_name": "Description", "attribute_value_mlt": [{"interim": "In distributed Authentication between clients andservers using public key cryptography approach, both client andserver do not need to maintain keys with Key DistributionCenter (KDC). Maintaining keys at the server may cause theburden at the server. This paper is intended to present anddevelop a system which uses an approach for distributedauthentication using public key cryptography using three maincomponents: Key Distribution Center(KDC), Ticket GrantingServer( TGS) and Certificate Authority(CA) , for creating ticketsas long lived credential authentication. In this system,Certificate Authority (CA) will distribute CertificationRevocation Lists(CRL) to all application servers, so it willsignificantly reduce the workload at the server(CA) and increasethe performance of the whole system."}]}, "item_1583103108160": {"attribute_name": "Keywords", "attribute_value": []}, "item_1583103120197": {"attribute_name": "Files", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_access", "date": [{"dateType": "Available", "dateValue": "2019-08-02"}], "displaytype": "preview", "download_preview_message": "", "file_order": 0, "filename": "Distributed Authentication Using Public Key Cryptography.pdf", "filesize": [{"value": "11 Kb"}], "format": "application/pdf", "future_date_message": "", "is_thumbnail": false, "licensetype": "license_free", "mimetype": "application/pdf", "size": 11000.0, "url": {"url": "https://meral.edu.mm/record/3922/files/Distributed Authentication Using Public Key Cryptography.pdf"}, "version_id": "5173e065-b7bd-45e0-8cbc-54c69592c346"}]}, "item_1583103131163": {"attribute_name": "Journal articles", "attribute_value_mlt": [{"subitem_issue": "", "subitem_journal_title": "Third Local Conference on Parallel and Soft Computing", "subitem_pages": "", "subitem_volume": ""}]}, "item_1583103147082": {"attribute_name": "Conference papers", "attribute_value_mlt": [{"subitem_acronym": "", "subitem_c_date": "", "subitem_conference_title": "", "subitem_part": "", "subitem_place": "", "subitem_session": "", "subitem_website": ""}]}, "item_1583103211336": {"attribute_name": "Books/reports/chapters", "attribute_value_mlt": [{"subitem_book_title": "", "subitem_isbn": "", "subitem_pages": "", "subitem_place": "", "subitem_publisher": ""}]}, "item_1583103233624": {"attribute_name": "Thesis/dissertations", "attribute_value_mlt": [{"subitem_awarding_university": "", "subitem_supervisor(s)": [{"subitem_supervisor": ""}]}]}, "item_1583105942107": {"attribute_name": "Authors", "attribute_value_mlt": [{"subitem_authors": [{"subitem_authors_fullname": "Kyaw, Wai Phyo"}, {"subitem_authors_fullname": "Zaw, Win Win"}]}]}, "item_1583108359239": {"attribute_name": "Upload type", "attribute_value_mlt": [{"interim": "Publication"}]}, "item_1583108428133": {"attribute_name": "Publication type", "attribute_value_mlt": [{"interim": "Article"}]}, "item_1583159729339": {"attribute_name": "Publication date", "attribute_value": "2009-08-03"}, "item_1583159847033": {"attribute_name": "Identifier", "attribute_value": "http://onlineresource.ucsy.edu.mm/handle/123456789/1641"}, "item_title": "Distributed Authentication Using Public Key Cryptography", "item_type_id": "21", "owner": "1", "path": ["1597824273898"], "permalink_uri": "http://hdl.handle.net/20.500.12678/0000003922", "pubdate": {"attribute_name": "Deposited date", "attribute_value": "2019-08-02"}, "publish_date": "2019-08-02", "publish_status": "0", "recid": "3922", "relation": {}, "relation_version_is_last": true, "title": ["Distributed Authentication Using Public Key Cryptography"], "weko_shared_id": -1}
  1. University of Computer Studies, Yangon
  2. Conferences

Distributed Authentication Using Public Key Cryptography

http://hdl.handle.net/20.500.12678/0000003922
http://hdl.handle.net/20.500.12678/0000003922
f8394da0-5344-4707-a7cf-6fcb12944285
560847f3-fb13-4a16-9fa5-d21858944cf9
None
Preview
Name / File License Actions
Distributed Distributed Authentication Using Public Key Cryptography.pdf (11 Kb)
Back
0
0
views
downloads
See details
Views Downloads

Versions

Ver.1 2020-09-01 13:46:59.246186
Show All versions

Share

Mendeley Twitter Facebook Print Addthis

Export

OAI-PMH
  • OAI-PMH DublinCore
Other Formats
  • JSON

Confirm


Back to MERAL


Back to MERAL