Log in
Language:

MERAL Myanmar Education Research and Learning Portal

  • Top
  • Universities
  • Ranking
To
lat lon distance
To

Field does not validate



Index Link

Index Tree

Please input email address.

WEKO

One fine body…

WEKO

One fine body…

Item

{"_buckets": {"deposit": "5ff7ba5a-cefd-4af6-9354-9b9516cb4b1a"}, "_deposit": {"id": "3929", "owners": [], "pid": {"revision_id": 0, "type": "recid", "value": "3929"}, "status": "published"}, "_oai": {"id": "oai:meral.edu.mm:recid/3929", "sets": ["user-ucsy"]}, "communities": ["ucsy"], "item_1583103067471": {"attribute_name": "Title", "attribute_value_mlt": [{"subitem_1551255647225": "Implementation of Information Security System Using Rc4 and Blowfish", "subitem_1551255648112": "en"}]}, "item_1583103085720": {"attribute_name": "Description", "attribute_value_mlt": [{"interim": "Computer security is an important field of study formost day-to-day transactions. Cryptography standards areneeded to create interoperability in the transformation securityworld. Cryptography mechanism is based on the secret key(symmetric) and public-key(asymmetric) . This paper presentsthe implementation of information security system using RC4and Blowfish and compares the performance of stream cipherand Black cipher with variable key length. It also investigatesthe performance and time consuming of RC4 and Blowfishsymmetric key algorithms. A user can encrypt and decryptseveral types of files such as text, image and sound files. Whencomparing the performance of two symmetric algorithms, RC4is faster than Blowfish."}]}, "item_1583103108160": {"attribute_name": "Keywords", "attribute_value": []}, "item_1583103120197": {"attribute_name": "Files", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_access", "date": [{"dateType": "Available", "dateValue": "2019-08-02"}], "displaytype": "preview", "download_preview_message": "", "file_order": 0, "filename": "Implementation of Information Security  System Using Rc4 and Blowfish.pdf", "filesize": [{"value": "10 Kb"}], "format": "application/pdf", "future_date_message": "", "is_thumbnail": false, "licensetype": "license_free", "mimetype": "application/pdf", "size": 10000.0, "url": {"url": "https://meral.edu.mm/record/3929/files/Implementation of Information Security  System Using Rc4 and Blowfish.pdf"}, "version_id": "5829b97b-1c7c-48bb-b425-53ad92aa2001"}]}, "item_1583103131163": {"attribute_name": "Journal articles", "attribute_value_mlt": [{"subitem_issue": "", "subitem_journal_title": "Third Local Conference on Parallel and Soft Computing", "subitem_pages": "", "subitem_volume": ""}]}, "item_1583103147082": {"attribute_name": "Conference papers", "attribute_value_mlt": [{"subitem_acronym": "", "subitem_c_date": "", "subitem_conference_title": "", "subitem_part": "", "subitem_place": "", "subitem_session": "", "subitem_website": ""}]}, "item_1583103211336": {"attribute_name": "Books/reports/chapters", "attribute_value_mlt": [{"subitem_book_title": "", "subitem_isbn": "", "subitem_pages": "", "subitem_place": "", "subitem_publisher": ""}]}, "item_1583103233624": {"attribute_name": "Thesis/dissertations", "attribute_value_mlt": [{"subitem_awarding_university": "", "subitem_supervisor(s)": [{"subitem_supervisor": ""}]}]}, "item_1583105942107": {"attribute_name": "Authors", "attribute_value_mlt": [{"subitem_authors": [{"subitem_authors_fullname": "Aye, Aye"}]}]}, "item_1583108359239": {"attribute_name": "Upload type", "attribute_value_mlt": [{"interim": "Publication"}]}, "item_1583108428133": {"attribute_name": "Publication type", "attribute_value_mlt": [{"interim": "Article"}]}, "item_1583159729339": {"attribute_name": "Publication date", "attribute_value": "2009-08-03"}, "item_1583159847033": {"attribute_name": "Identifier", "attribute_value": "http://onlineresource.ucsy.edu.mm/handle/123456789/1648"}, "item_title": "Implementation of Information Security System Using Rc4 and Blowfish", "item_type_id": "21", "owner": "1", "path": ["1597824273898"], "permalink_uri": "http://hdl.handle.net/20.500.12678/0000003929", "pubdate": {"attribute_name": "Deposited date", "attribute_value": "2019-08-02"}, "publish_date": "2019-08-02", "publish_status": "0", "recid": "3929", "relation": {}, "relation_version_is_last": true, "title": ["Implementation of Information Security System Using Rc4 and Blowfish"], "weko_shared_id": -1}
  1. University of Computer Studies, Yangon
  2. Conferences

Implementation of Information Security System Using Rc4 and Blowfish

http://hdl.handle.net/20.500.12678/0000003929
http://hdl.handle.net/20.500.12678/0000003929
fb4be3de-3389-47c7-bcb5-12eb507b71dd
5ff7ba5a-cefd-4af6-9354-9b9516cb4b1a
None
Preview
Name / File License Actions
Implementation Implementation of Information Security System Using Rc4 and Blowfish.pdf (10 Kb)
Back
0
0
views
downloads
See details
Views Downloads

Versions

Ver.1 2020-09-01 13:47:15.391841
Show All versions

Share

Mendeley Twitter Facebook Print Addthis

Export

OAI-PMH
  • OAI-PMH DublinCore
Other Formats
  • JSON

Confirm


Back to MERAL


Back to MERAL