{"created":"2020-09-01T13:47:02.558194+00:00","id":3924,"links":{},"metadata":{"_buckets":{"deposit":"c1104306-e11b-4e72-b247-285c978d3a04"},"_deposit":{"id":"3924","owners":[],"pid":{"revision_id":0,"type":"recid","value":"3924"},"status":"published"},"_oai":{"id":"oai:meral.edu.mm:recid/3924","sets":["1582963302567:1597824273898"]},"communities":["ucsy"],"item_1583103067471":{"attribute_name":"Title","attribute_value_mlt":[{"subitem_1551255647225":"Email encryption with Linear Congruential Generator","subitem_1551255648112":"en"}]},"item_1583103085720":{"attribute_name":"Description","attribute_value_mlt":[{"interim":"E-mail is widely used all over the world invarious fields such as economic, office, personal case and so on.It is easy to transport data from place to place in a short time.E-mail has become one of the most important means ofcommunication. In this process, attackers interfere with E-mailby feeding and accessing data and also by taking these andtransporting the false data to users. So, the mail security isnecessary by using cryptography method to protect the dangerof the attackers. In this paper, Linear CongruentialMethod(LCM) and River Shamir Adleman (RSA) are used foremail encryption for lightweight for email. LCM in generatingpseudo-random numbers is used to provide an alternativeattitude for some cryptographic purpose."}]},"item_1583103108160":{"attribute_name":"Keywords","attribute_value":[]},"item_1583103120197":{"attribute_name":"Files","attribute_type":"file","attribute_value_mlt":[{"accessrole":"open_access","date":[{"dateType":"Available","dateValue":"2019-08-02"}],"displaytype":"preview","filename":"Email encryption with Linear Congruential Generator.pdf","filesize":[{"value":"10 Kb"}],"format":"application/pdf","licensetype":"license_note","mimetype":"application/pdf","url":{"url":"https://meral.edu.mm/record/3924/files/Email encryption with Linear Congruential Generator.pdf"},"version_id":"40e6fa5c-665b-4f78-b7da-894aa8c445ba"}]},"item_1583103131163":{"attribute_name":"Journal articles","attribute_value_mlt":[{"subitem_issue":"","subitem_journal_title":"Third Local Conference on Parallel and Soft Computing","subitem_pages":"","subitem_volume":""}]},"item_1583103147082":{"attribute_name":"Conference papers","attribute_value_mlt":[{"subitem_acronym":"","subitem_c_date":"","subitem_conference_title":"","subitem_part":"","subitem_place":"","subitem_session":"","subitem_website":""}]},"item_1583103211336":{"attribute_name":"Books/reports/chapters","attribute_value_mlt":[{"subitem_book_title":"","subitem_isbn":"","subitem_pages":"","subitem_place":"","subitem_publisher":""}]},"item_1583103233624":{"attribute_name":"Thesis/dissertations","attribute_value_mlt":[{"subitem_awarding_university":"","subitem_supervisor(s)":[{"subitem_supervisor":""}]}]},"item_1583105942107":{"attribute_name":"Authors","attribute_value_mlt":[{"subitem_authors":[{"subitem_authors_fullname":"Kyaw, Phyo Wai"},{"subitem_authors_fullname":"Kham, Nang Saing Moon"}]}]},"item_1583108359239":{"attribute_name":"Upload type","attribute_value_mlt":[{"interim":"Publication"}]},"item_1583108428133":{"attribute_name":"Publication type","attribute_value_mlt":[{"interim":"Article"}]},"item_1583159729339":{"attribute_name":"Publication date","attribute_value":"2009-08-03"},"item_1583159847033":{"attribute_name":"Identifier","attribute_value":"http://onlineresource.ucsy.edu.mm/handle/123456789/1643"},"item_title":"Email encryption with Linear Congruential Generator","item_type_id":"21","owner":"1","path":["1597824273898"],"publish_date":"2019-08-02","publish_status":"0","recid":"3924","relation_version_is_last":true,"title":["Email encryption with Linear Congruential Generator"],"weko_creator_id":"1","weko_shared_id":-1},"updated":"2021-12-13T01:16:55.069705+00:00"}