{"created":"2020-09-01T13:48:08.878432+00:00","id":3947,"links":{},"metadata":{"_buckets":{"deposit":"8fdbc8f8-a54d-4eee-b3ea-6b665b3a14eb"},"_deposit":{"id":"3947","owners":[],"pid":{"revision_id":0,"type":"recid","value":"3947"},"status":"published"},"_oai":{"id":"oai:meral.edu.mm:recid/3947","sets":["1582963302567:1597824273898"]},"communities":["ucsy"],"item_1583103067471":{"attribute_name":"Title","attribute_value_mlt":[{"subitem_1551255647225":"Secure Symmetric Key Management Scheme with Control Vector System","subitem_1551255648112":"en"}]},"item_1583103085720":{"attribute_name":"Description","attribute_value_mlt":[{"interim":"Security is necessary for to protect theinformation transmission. Cryptography is the process ofencryption and decryption a message for data security (such assymmetric and asymmetric cryptography). In this system,symmetric key cryptography and cryptography key usage basedon control vector. Each cryptographic key has an associatedcontrol vector that defines the permitted use of the key within thecryptographic system. In this paper, this use of control vector incrypto systems based on hash function (MD5) and AdvancedEncryption Standard (AES)."}]},"item_1583103108160":{"attribute_name":"Keywords","attribute_value":[]},"item_1583103120197":{"attribute_name":"Files","attribute_type":"file","attribute_value_mlt":[{"accessrole":"open_access","date":[{"dateType":"Available","dateValue":"2019-08-02"}],"displaytype":"preview","filename":"Secure Symmetric Key Management Scheme with Control Vector System.pdf","filesize":[{"value":"10 Kb"}],"format":"application/pdf","licensetype":"license_note","mimetype":"application/pdf","url":{"url":"https://meral.edu.mm/record/3947/files/Secure Symmetric Key Management Scheme with Control Vector System.pdf"},"version_id":"d04e93c9-df1a-4977-b50c-56cc9d02c1b3"}]},"item_1583103131163":{"attribute_name":"Journal articles","attribute_value_mlt":[{"subitem_issue":"","subitem_journal_title":"Third Local Conference on Parallel and Soft Computing","subitem_pages":"","subitem_volume":""}]},"item_1583103147082":{"attribute_name":"Conference papers","attribute_value_mlt":[{"subitem_acronym":"","subitem_c_date":"","subitem_conference_title":"","subitem_part":"","subitem_place":"","subitem_session":"","subitem_website":""}]},"item_1583103211336":{"attribute_name":"Books/reports/chapters","attribute_value_mlt":[{"subitem_book_title":"","subitem_isbn":"","subitem_pages":"","subitem_place":"","subitem_publisher":""}]},"item_1583103233624":{"attribute_name":"Thesis/dissertations","attribute_value_mlt":[{"subitem_awarding_university":"","subitem_supervisor(s)":[{"subitem_supervisor":""}]}]},"item_1583105942107":{"attribute_name":"Authors","attribute_value_mlt":[{"subitem_authors":[{"subitem_authors_fullname":"Htun, Nay Lynn"},{"subitem_authors_fullname":"Mya, Khin Than"}]}]},"item_1583108359239":{"attribute_name":"Upload type","attribute_value_mlt":[{"interim":"Publication"}]},"item_1583108428133":{"attribute_name":"Publication type","attribute_value_mlt":[{"interim":"Article"}]},"item_1583159729339":{"attribute_name":"Publication date","attribute_value":"2009-08-03"},"item_1583159847033":{"attribute_name":"Identifier","attribute_value":"http://onlineresource.ucsy.edu.mm/handle/123456789/1664"},"item_title":"Secure Symmetric Key Management Scheme with Control Vector System","item_type_id":"21","owner":"1","path":["1597824273898"],"publish_date":"2019-08-02","publish_status":"0","recid":"3947","relation_version_is_last":true,"title":["Secure Symmetric Key Management Scheme with Control Vector System"],"weko_creator_id":"1","weko_shared_id":-1},"updated":"2021-12-13T00:50:55.514411+00:00"}