MERAL Myanmar Education Research and Learning Portal
Item
{"_buckets": {"deposit": "c1104306-e11b-4e72-b247-285c978d3a04"}, "_deposit": {"id": "3924", "owners": [], "pid": {"revision_id": 0, "type": "recid", "value": "3924"}, "status": "published"}, "_oai": {"id": "oai:meral.edu.mm:recid/3924", "sets": ["user-ucsy"]}, "communities": ["ucsy"], "item_1583103067471": {"attribute_name": "Title", "attribute_value_mlt": [{"subitem_1551255647225": "Email encryption with Linear Congruential Generator", "subitem_1551255648112": "en"}]}, "item_1583103085720": {"attribute_name": "Description", "attribute_value_mlt": [{"interim": "E-mail is widely used all over the world invarious fields such as economic, office, personal case and so on.It is easy to transport data from place to place in a short time.E-mail has become one of the most important means ofcommunication. In this process, attackers interfere with E-mailby feeding and accessing data and also by taking these andtransporting the false data to users. So, the mail security isnecessary by using cryptography method to protect the dangerof the attackers. In this paper, Linear CongruentialMethod(LCM) and River Shamir Adleman (RSA) are used foremail encryption for lightweight for email. LCM in generatingpseudo-random numbers is used to provide an alternativeattitude for some cryptographic purpose."}]}, "item_1583103108160": {"attribute_name": "Keywords", "attribute_value": []}, "item_1583103120197": {"attribute_name": "Files", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_access", "date": [{"dateType": "Available", "dateValue": "2019-08-02"}], "displaytype": "preview", "download_preview_message": "", "file_order": 0, "filename": "Email encryption with Linear Congruential Generator.pdf", "filesize": [{"value": "10 Kb"}], "format": "application/pdf", "future_date_message": "", "is_thumbnail": false, "licensetype": "license_free", "mimetype": "application/pdf", "size": 10000.0, "url": {"url": "https://meral.edu.mm/record/3924/files/Email encryption with Linear Congruential Generator.pdf"}, "version_id": "40e6fa5c-665b-4f78-b7da-894aa8c445ba"}]}, "item_1583103131163": {"attribute_name": "Journal articles", "attribute_value_mlt": [{"subitem_issue": "", "subitem_journal_title": "Third Local Conference on Parallel and Soft Computing", "subitem_pages": "", "subitem_volume": ""}]}, "item_1583103147082": {"attribute_name": "Conference papers", "attribute_value_mlt": [{"subitem_acronym": "", "subitem_c_date": "", "subitem_conference_title": "", "subitem_part": "", "subitem_place": "", "subitem_session": "", "subitem_website": ""}]}, "item_1583103211336": {"attribute_name": "Books/reports/chapters", "attribute_value_mlt": [{"subitem_book_title": "", "subitem_isbn": "", "subitem_pages": "", "subitem_place": "", "subitem_publisher": ""}]}, "item_1583103233624": {"attribute_name": "Thesis/dissertations", "attribute_value_mlt": [{"subitem_awarding_university": "", "subitem_supervisor(s)": [{"subitem_supervisor": ""}]}]}, "item_1583105942107": {"attribute_name": "Authors", "attribute_value_mlt": [{"subitem_authors": [{"subitem_authors_fullname": "Kyaw, Phyo Wai"}, {"subitem_authors_fullname": "Kham, Nang Saing Moon"}]}]}, "item_1583108359239": {"attribute_name": "Upload type", "attribute_value_mlt": [{"interim": "Publication"}]}, "item_1583108428133": {"attribute_name": "Publication type", "attribute_value_mlt": [{"interim": "Article"}]}, "item_1583159729339": {"attribute_name": "Publication date", "attribute_value": "2009-08-03"}, "item_1583159847033": {"attribute_name": "Identifier", "attribute_value": "http://onlineresource.ucsy.edu.mm/handle/123456789/1643"}, "item_title": "Email encryption with Linear Congruential Generator", "item_type_id": "21", "owner": "1", "path": ["1597824273898"], "permalink_uri": "http://hdl.handle.net/20.500.12678/0000003924", "pubdate": {"attribute_name": "Deposited date", "attribute_value": "2019-08-02"}, "publish_date": "2019-08-02", "publish_status": "0", "recid": "3924", "relation": {}, "relation_version_is_last": true, "title": ["Email encryption with Linear Congruential Generator"], "weko_shared_id": -1}
Email encryption with Linear Congruential Generator
http://hdl.handle.net/20.500.12678/0000003924
http://hdl.handle.net/20.500.12678/0000003924c3a07ee4-7921-4074-b16a-eec1da77d278
c1104306-e11b-4e72-b247-285c978d3a04
Name / File | License | Actions |
---|---|---|
Email encryption with Linear Congruential Generator.pdf (10 Kb)
|
|