{"created":"2020-09-01T13:47:16.647168+00:00","id":3930,"links":{},"metadata":{"_buckets":{"deposit":"eaad30b0-ddbf-420b-a66d-eae77311fcb5"},"_deposit":{"id":"3930","owners":[],"pid":{"revision_id":0,"type":"recid","value":"3930"},"status":"published"},"_oai":{"id":"oai:meral.edu.mm:recid/3930","sets":["1582963302567:1597824273898"]},"communities":["ucsy"],"item_1583103067471":{"attribute_name":"Title","attribute_value_mlt":[{"subitem_1551255647225":"Implementation of Myanmar Character Cryptosystem","subitem_1551255648112":"en"}]},"item_1583103085720":{"attribute_name":"Description","attribute_value_mlt":[{"interim":"Cryptographic algorithm could be used to protectsensitive and valuable data during transmission and in storage.Encryption had been largely the concern of military andintelligence organizations. Among them, Myanmar textinformation is widely used in business, military data and otherorganizations. However, most of cryptosystem are provided forEnglish Language, and Encryption for Myanmar Language isnecessary. And there is no efficient method for MyanmarLanguage yet. Therefore, this paper is an attempt to enable apractical and efficient composing of text information withMyanmar Language on a general purpose computer."}]},"item_1583103108160":{"attribute_name":"Keywords","attribute_value":[]},"item_1583103120197":{"attribute_name":"Files","attribute_type":"file","attribute_value_mlt":[{"accessrole":"open_access","date":[{"dateType":"Available","dateValue":"2019-08-02"}],"displaytype":"preview","filename":"Implementation of Myanmar Character Cryptosystem.pdf","filesize":[{"value":"10 Kb"}],"format":"application/pdf","licensetype":"license_note","mimetype":"application/pdf","url":{"url":"https://meral.edu.mm/record/3930/files/Implementation of Myanmar Character Cryptosystem.pdf"},"version_id":"1b7299f7-aa2a-4272-8e69-f22199ff3dd4"}]},"item_1583103131163":{"attribute_name":"Journal articles","attribute_value_mlt":[{"subitem_issue":"","subitem_journal_title":"Third Local Conference on Parallel and Soft Computing","subitem_pages":"","subitem_volume":""}]},"item_1583103147082":{"attribute_name":"Conference papers","attribute_value_mlt":[{"subitem_acronym":"","subitem_c_date":"","subitem_conference_title":"","subitem_part":"","subitem_place":"","subitem_session":"","subitem_website":""}]},"item_1583103211336":{"attribute_name":"Books/reports/chapters","attribute_value_mlt":[{"subitem_book_title":"","subitem_isbn":"","subitem_pages":"","subitem_place":"","subitem_publisher":""}]},"item_1583103233624":{"attribute_name":"Thesis/dissertations","attribute_value_mlt":[{"subitem_awarding_university":"","subitem_supervisor(s)":[{"subitem_supervisor":""}]}]},"item_1583105942107":{"attribute_name":"Authors","attribute_value_mlt":[{"subitem_authors":[{"subitem_authors_fullname":"Hein, Kyaw Mg Mg"},{"subitem_authors_fullname":"Mya, Khin Than"}]}]},"item_1583108359239":{"attribute_name":"Upload type","attribute_value_mlt":[{"interim":"Publication"}]},"item_1583108428133":{"attribute_name":"Publication type","attribute_value_mlt":[{"interim":"Article"}]},"item_1583159729339":{"attribute_name":"Publication date","attribute_value":"2009-08-03"},"item_1583159847033":{"attribute_name":"Identifier","attribute_value":"http://onlineresource.ucsy.edu.mm/handle/123456789/1649"},"item_title":"Implementation of Myanmar Character Cryptosystem","item_type_id":"21","owner":"1","path":["1597824273898"],"publish_date":"2019-08-02","publish_status":"0","recid":"3930","relation_version_is_last":true,"title":["Implementation of Myanmar Character Cryptosystem"],"weko_creator_id":"1","weko_shared_id":-1},"updated":"2022-03-24T23:11:49.315787+00:00"}