{"created":"2020-09-01T13:47:11.832068+00:00","id":3928,"links":{},"metadata":{"_buckets":{"deposit":"c1035fbc-57c2-457b-bdf5-4a94d85b784e"},"_deposit":{"id":"3928","owners":[],"pid":{"revision_id":0,"type":"recid","value":"3928"},"status":"published"},"_oai":{"id":"oai:meral.edu.mm:recid/3928","sets":["1582963302567:1597824273898"]},"communities":["ucsy"],"item_1583103067471":{"attribute_name":"Title","attribute_value_mlt":[{"subitem_1551255647225":"Implementation of Email Security System Using RC5, BBS and RSA","subitem_1551255648112":"en"}]},"item_1583103085720":{"attribute_name":"Description","attribute_value_mlt":[{"interim":"The propose system intends to implement the Emailsecurity system using RC5, BBS and RSA algorithms toencrypt and decrypt of messages. It also intends to analysis thesymmetric key algorithm , public key algorithm , randomnumber and random number generation. It provides theinformation security between users and also provides study ofrandom numbers. This memory requirement algorithm to protectthe information, data integrity and authentication of the data isensured."}]},"item_1583103108160":{"attribute_name":"Keywords","attribute_value":[]},"item_1583103120197":{"attribute_name":"Files","attribute_type":"file","attribute_value_mlt":[{"accessrole":"open_access","date":[{"dateType":"Available","dateValue":"2019-08-02"}],"displaytype":"preview","filename":"Implementation of Email Security System Using RC5.pdf","filesize":[{"value":"10 Kb"}],"format":"application/pdf","licensetype":"license_note","mimetype":"application/pdf","url":{"url":"https://meral.edu.mm/record/3928/files/Implementation of Email Security System Using RC5.pdf"},"version_id":"fe856d46-5e76-4f16-8079-1c66bbc3f211"}]},"item_1583103131163":{"attribute_name":"Journal articles","attribute_value_mlt":[{"subitem_issue":"","subitem_journal_title":"Third Local Conference on Parallel and Soft Computing","subitem_pages":"","subitem_volume":""}]},"item_1583103147082":{"attribute_name":"Conference papers","attribute_value_mlt":[{"subitem_acronym":"","subitem_c_date":"","subitem_conference_title":"","subitem_part":"","subitem_place":"","subitem_session":"","subitem_website":""}]},"item_1583103211336":{"attribute_name":"Books/reports/chapters","attribute_value_mlt":[{"subitem_book_title":"","subitem_isbn":"","subitem_pages":"","subitem_place":"","subitem_publisher":""}]},"item_1583103233624":{"attribute_name":"Thesis/dissertations","attribute_value_mlt":[{"subitem_awarding_university":"","subitem_supervisor(s)":[{"subitem_supervisor":""}]}]},"item_1583105942107":{"attribute_name":"Authors","attribute_value_mlt":[{"subitem_authors":[{"subitem_authors_fullname":"Tun, Thurein"},{"subitem_authors_fullname":"Ni, Nwe"}]}]},"item_1583108359239":{"attribute_name":"Upload type","attribute_value_mlt":[{"interim":"Publication"}]},"item_1583108428133":{"attribute_name":"Publication type","attribute_value_mlt":[{"interim":"Article"}]},"item_1583159729339":{"attribute_name":"Publication date","attribute_value":"2009-08-03"},"item_1583159847033":{"attribute_name":"Identifier","attribute_value":"http://onlineresource.ucsy.edu.mm/handle/123456789/1647"},"item_title":"Implementation of Email Security System Using RC5, BBS and RSA","item_type_id":"21","owner":"1","path":["1597824273898"],"publish_date":"2019-08-02","publish_status":"0","recid":"3928","relation_version_is_last":true,"title":["Implementation of Email Security System Using RC5, BBS and RSA"],"weko_creator_id":"1","weko_shared_id":-1},"updated":"2022-03-24T23:11:48.800001+00:00"}