{"created":"2020-09-01T13:47:33.654144+00:00","id":3936,"links":{},"metadata":{"_buckets":{"deposit":"923ea50e-89fc-4e1d-814c-a6bbb93789bf"},"_deposit":{"id":"3936","owners":[],"pid":{"revision_id":0,"type":"recid","value":"3936"},"status":"published"},"_oai":{"id":"oai:meral.edu.mm:recid/3936","sets":["1582963302567:1597824273898"]},"communities":["ucsy"],"item_1583103067471":{"attribute_name":"Title","attribute_value_mlt":[{"subitem_1551255647225":"Implementation of Station-to-Station Protocol for Prevention Man-In-The-Middle Attack","subitem_1551255648112":"en"}]},"item_1583103085720":{"attribute_name":"Description","attribute_value_mlt":[{"interim":"Computer security is very important role forinformation and data. Data communication is the mostimportant in the world. Communication technology is increasedas well as an authorized person can intercept the security of thesystem and can get the data. So, computer security is the mostimportant and must secure our data in communication. In thissystem, man-in-the-middle attack, in which the adversaryinserts, deletes, or arbitrarily modifies messages sent from oneuser to another by using Diffie-Hellman key exchangealgorithm. To prevent this man-in-the-middle attack, station-tostationprotocol can be used. STS protocol is a cryptographickey agreement scheme based on classic Diffie-Hellman."}]},"item_1583103108160":{"attribute_name":"Keywords","attribute_value":[]},"item_1583103120197":{"attribute_name":"Files","attribute_type":"file","attribute_value_mlt":[{"accessrole":"open_access","date":[{"dateType":"Available","dateValue":"2019-08-02"}],"displaytype":"preview","filename":"Implementation of Station.pdf","filesize":[{"value":"10 Kb"}],"format":"application/pdf","licensetype":"license_note","mimetype":"application/pdf","url":{"url":"https://meral.edu.mm/record/3936/files/Implementation of Station.pdf"},"version_id":"4021e277-e954-4efe-a4d7-b5b2ae95baf3"}]},"item_1583103131163":{"attribute_name":"Journal articles","attribute_value_mlt":[{"subitem_issue":"","subitem_journal_title":"Third Local Conference on Parallel and Soft Computing","subitem_pages":"","subitem_volume":""}]},"item_1583103147082":{"attribute_name":"Conference papers","attribute_value_mlt":[{"subitem_acronym":"","subitem_c_date":"","subitem_conference_title":"","subitem_part":"","subitem_place":"","subitem_session":"","subitem_website":""}]},"item_1583103211336":{"attribute_name":"Books/reports/chapters","attribute_value_mlt":[{"subitem_book_title":"","subitem_isbn":"","subitem_pages":"","subitem_place":"","subitem_publisher":""}]},"item_1583103233624":{"attribute_name":"Thesis/dissertations","attribute_value_mlt":[{"subitem_awarding_university":"","subitem_supervisor(s)":[{"subitem_supervisor":""}]}]},"item_1583105942107":{"attribute_name":"Authors","attribute_value_mlt":[{"subitem_authors":[{"subitem_authors_fullname":"Thein, Si Thu Min"},{"subitem_authors_fullname":"Mya, Khin Than"}]}]},"item_1583108359239":{"attribute_name":"Upload type","attribute_value_mlt":[{"interim":"Publication"}]},"item_1583108428133":{"attribute_name":"Publication type","attribute_value_mlt":[{"interim":"Article"}]},"item_1583159729339":{"attribute_name":"Publication date","attribute_value":"2009-08-03"},"item_1583159847033":{"attribute_name":"Identifier","attribute_value":"http://onlineresource.ucsy.edu.mm/handle/123456789/1654"},"item_title":"Implementation of Station-to-Station Protocol for Prevention Man-In-The-Middle Attack","item_type_id":"21","owner":"1","path":["1597824273898"],"publish_date":"2019-08-02","publish_status":"0","recid":"3936","relation_version_is_last":true,"title":["Implementation of Station-to-Station Protocol for Prevention Man-In-The-Middle Attack"],"weko_creator_id":"1","weko_shared_id":-1},"updated":"2021-12-13T04:34:09.488915+00:00"}