Log in
Language:

MERAL Myanmar Education Research and Learning Portal

  • Top
  • Universities
  • Ranking
To
lat lon distance
To

Field does not validate



Index Link

Index Tree

Please input email address.

WEKO

One fine body…

WEKO

One fine body…

Item

{"_buckets": {"deposit": "c1104306-e11b-4e72-b247-285c978d3a04"}, "_deposit": {"id": "3924", "owners": [], "pid": {"revision_id": 0, "type": "recid", "value": "3924"}, "status": "published"}, "_oai": {"id": "oai:meral.edu.mm:recid/3924", "sets": ["user-ucsy"]}, "communities": ["ucsy"], "item_1583103067471": {"attribute_name": "Title", "attribute_value_mlt": [{"subitem_1551255647225": "Email encryption with Linear Congruential Generator", "subitem_1551255648112": "en"}]}, "item_1583103085720": {"attribute_name": "Description", "attribute_value_mlt": [{"interim": "E-mail is widely used all over the world invarious fields such as economic, office, personal case and so on.It is easy to transport data from place to place in a short time.E-mail has become one of the most important means ofcommunication. In this process, attackers interfere with E-mailby feeding and accessing data and also by taking these andtransporting the false data to users. So, the mail security isnecessary by using cryptography method to protect the dangerof the attackers. In this paper, Linear CongruentialMethod(LCM) and River Shamir Adleman (RSA) are used foremail encryption for lightweight for email. LCM in generatingpseudo-random numbers is used to provide an alternativeattitude for some cryptographic purpose."}]}, "item_1583103108160": {"attribute_name": "Keywords", "attribute_value": []}, "item_1583103120197": {"attribute_name": "Files", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_access", "date": [{"dateType": "Available", "dateValue": "2019-08-02"}], "displaytype": "preview", "download_preview_message": "", "file_order": 0, "filename": "Email encryption with Linear Congruential Generator.pdf", "filesize": [{"value": "10 Kb"}], "format": "application/pdf", "future_date_message": "", "is_thumbnail": false, "licensetype": "license_free", "mimetype": "application/pdf", "size": 10000.0, "url": {"url": "https://meral.edu.mm/record/3924/files/Email encryption with Linear Congruential Generator.pdf"}, "version_id": "40e6fa5c-665b-4f78-b7da-894aa8c445ba"}]}, "item_1583103131163": {"attribute_name": "Journal articles", "attribute_value_mlt": [{"subitem_issue": "", "subitem_journal_title": "Third Local Conference on Parallel and Soft Computing", "subitem_pages": "", "subitem_volume": ""}]}, "item_1583103147082": {"attribute_name": "Conference papers", "attribute_value_mlt": [{"subitem_acronym": "", "subitem_c_date": "", "subitem_conference_title": "", "subitem_part": "", "subitem_place": "", "subitem_session": "", "subitem_website": ""}]}, "item_1583103211336": {"attribute_name": "Books/reports/chapters", "attribute_value_mlt": [{"subitem_book_title": "", "subitem_isbn": "", "subitem_pages": "", "subitem_place": "", "subitem_publisher": ""}]}, "item_1583103233624": {"attribute_name": "Thesis/dissertations", "attribute_value_mlt": [{"subitem_awarding_university": "", "subitem_supervisor(s)": [{"subitem_supervisor": ""}]}]}, "item_1583105942107": {"attribute_name": "Authors", "attribute_value_mlt": [{"subitem_authors": [{"subitem_authors_fullname": "Kyaw, Phyo Wai"}, {"subitem_authors_fullname": "Kham, Nang Saing Moon"}]}]}, "item_1583108359239": {"attribute_name": "Upload type", "attribute_value_mlt": [{"interim": "Publication"}]}, "item_1583108428133": {"attribute_name": "Publication type", "attribute_value_mlt": [{"interim": "Article"}]}, "item_1583159729339": {"attribute_name": "Publication date", "attribute_value": "2009-08-03"}, "item_1583159847033": {"attribute_name": "Identifier", "attribute_value": "http://onlineresource.ucsy.edu.mm/handle/123456789/1643"}, "item_title": "Email encryption with Linear Congruential Generator", "item_type_id": "21", "owner": "1", "path": ["1597824273898"], "permalink_uri": "http://hdl.handle.net/20.500.12678/0000003924", "pubdate": {"attribute_name": "Deposited date", "attribute_value": "2019-08-02"}, "publish_date": "2019-08-02", "publish_status": "0", "recid": "3924", "relation": {}, "relation_version_is_last": true, "title": ["Email encryption with Linear Congruential Generator"], "weko_shared_id": -1}
  1. University of Computer Studies, Yangon
  2. Conferences

Email encryption with Linear Congruential Generator

http://hdl.handle.net/20.500.12678/0000003924
http://hdl.handle.net/20.500.12678/0000003924
c3a07ee4-7921-4074-b16a-eec1da77d278
c1104306-e11b-4e72-b247-285c978d3a04
None
Preview
Name / File License Actions
Email Email encryption with Linear Congruential Generator.pdf (10 Kb)
Back
0
0
views
downloads
See details
Views Downloads

Versions

Ver.1 2020-09-01 13:47:03.450053
Show All versions

Share

Mendeley Twitter Facebook Print Addthis

Export

OAI-PMH
  • OAI-PMH DublinCore
Other Formats
  • JSON

Confirm


Back to MERAL


Back to MERAL