Log in
Language:

MERAL Myanmar Education Research and Learning Portal

  • Top
  • Universities
  • Ranking
To
lat lon distance
To

Field does not validate



Index Link

Index Tree

Please input email address.

WEKO

One fine body…

WEKO

One fine body…

Item

{"_buckets": {"deposit": "923ea50e-89fc-4e1d-814c-a6bbb93789bf"}, "_deposit": {"id": "3936", "owners": [], "pid": {"revision_id": 0, "type": "recid", "value": "3936"}, "status": "published"}, "_oai": {"id": "oai:meral.edu.mm:recid/3936", "sets": ["user-ucsy"]}, "communities": ["ucsy"], "item_1583103067471": {"attribute_name": "Title", "attribute_value_mlt": [{"subitem_1551255647225": "Implementation of Station-to-Station Protocol for Prevention Man-In-The-Middle Attack", "subitem_1551255648112": "en"}]}, "item_1583103085720": {"attribute_name": "Description", "attribute_value_mlt": [{"interim": "Computer security is very important role forinformation and data. Data communication is the mostimportant in the world. Communication technology is increasedas well as an authorized person can intercept the security of thesystem and can get the data. So, computer security is the mostimportant and must secure our data in communication. In thissystem, man-in-the-middle attack, in which the adversaryinserts, deletes, or arbitrarily modifies messages sent from oneuser to another by using Diffie-Hellman key exchangealgorithm. To prevent this man-in-the-middle attack, station-tostationprotocol can be used. STS protocol is a cryptographickey agreement scheme based on classic Diffie-Hellman."}]}, "item_1583103108160": {"attribute_name": "Keywords", "attribute_value": []}, "item_1583103120197": {"attribute_name": "Files", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_access", "date": [{"dateType": "Available", "dateValue": "2019-08-02"}], "displaytype": "preview", "download_preview_message": "", "file_order": 0, "filename": "Implementation of Station.pdf", "filesize": [{"value": "10 Kb"}], "format": "application/pdf", "future_date_message": "", "is_thumbnail": false, "licensetype": "license_free", "mimetype": "application/pdf", "size": 10000.0, "url": {"url": "https://meral.edu.mm/record/3936/files/Implementation of Station.pdf"}, "version_id": "4021e277-e954-4efe-a4d7-b5b2ae95baf3"}]}, "item_1583103131163": {"attribute_name": "Journal articles", "attribute_value_mlt": [{"subitem_issue": "", "subitem_journal_title": "Third Local Conference on Parallel and Soft Computing", "subitem_pages": "", "subitem_volume": ""}]}, "item_1583103147082": {"attribute_name": "Conference papers", "attribute_value_mlt": [{"subitem_acronym": "", "subitem_c_date": "", "subitem_conference_title": "", "subitem_part": "", "subitem_place": "", "subitem_session": "", "subitem_website": ""}]}, "item_1583103211336": {"attribute_name": "Books/reports/chapters", "attribute_value_mlt": [{"subitem_book_title": "", "subitem_isbn": "", "subitem_pages": "", "subitem_place": "", "subitem_publisher": ""}]}, "item_1583103233624": {"attribute_name": "Thesis/dissertations", "attribute_value_mlt": [{"subitem_awarding_university": "", "subitem_supervisor(s)": [{"subitem_supervisor": ""}]}]}, "item_1583105942107": {"attribute_name": "Authors", "attribute_value_mlt": [{"subitem_authors": [{"subitem_authors_fullname": "Thein, Si Thu Min"}, {"subitem_authors_fullname": "Mya, Khin Than"}]}]}, "item_1583108359239": {"attribute_name": "Upload type", "attribute_value_mlt": [{"interim": "Publication"}]}, "item_1583108428133": {"attribute_name": "Publication type", "attribute_value_mlt": [{"interim": "Article"}]}, "item_1583159729339": {"attribute_name": "Publication date", "attribute_value": "2009-08-03"}, "item_1583159847033": {"attribute_name": "Identifier", "attribute_value": "http://onlineresource.ucsy.edu.mm/handle/123456789/1654"}, "item_title": "Implementation of Station-to-Station Protocol for Prevention Man-In-The-Middle Attack", "item_type_id": "21", "owner": "1", "path": ["1597824273898"], "permalink_uri": "http://hdl.handle.net/20.500.12678/0000003936", "pubdate": {"attribute_name": "Deposited date", "attribute_value": "2019-08-02"}, "publish_date": "2019-08-02", "publish_status": "0", "recid": "3936", "relation": {}, "relation_version_is_last": true, "title": ["Implementation of Station-to-Station Protocol for Prevention Man-In-The-Middle Attack"], "weko_shared_id": -1}
  1. University of Computer Studies, Yangon
  2. Conferences

Implementation of Station-to-Station Protocol for Prevention Man-In-The-Middle Attack

http://hdl.handle.net/20.500.12678/0000003936
http://hdl.handle.net/20.500.12678/0000003936
776e52b3-b282-40d9-8a54-0c34d19f0751
923ea50e-89fc-4e1d-814c-a6bbb93789bf
None
Preview
Name / File License Actions
Implementation Implementation of Station.pdf (10 Kb)
Back
0
0
views
downloads
See details
Views Downloads

Versions

Ver.1 2020-09-01 13:47:34.900418
Show All versions

Share

Mendeley Twitter Facebook Print Addthis

Export

OAI-PMH
  • OAI-PMH DublinCore
Other Formats
  • JSON

Confirm


Back to MERAL


Back to MERAL