{"created":"2020-09-01T13:48:13.701766+00:00","id":3949,"links":{},"metadata":{"_buckets":{"deposit":"942eab09-7b92-4924-b2b6-e01d99e05ea1"},"_deposit":{"id":"3949","owners":[],"pid":{"revision_id":0,"type":"recid","value":"3949"},"status":"published"},"_oai":{"id":"oai:meral.edu.mm:recid/3949","sets":["1582963302567:1597824273898"]},"communities":["ucsy"],"item_1583103067471":{"attribute_name":"Title","attribute_value_mlt":[{"subitem_1551255647225":"Sending Secured Information Over Unsecured Channel Using Hash Chaining Approach","subitem_1551255648112":"en"}]},"item_1583103085720":{"attribute_name":"Description","attribute_value_mlt":[{"interim":"Information and access to information is important inmodern society. Network security is necessary to counter thethreats and make network safe to use. There are some methodsto prevent eavesdropping or falsification of information;encryption of information, authentication of user identifies andcontrol of access rights. Public key cryptography is used toprotect digital data going through and insecure channel formone place to another . Then sender’s authenticity certifies thatthe data has not been falsified by using the public keycryptography. Digital signature is a user authentication methodto prevent impersonations and symmetric key encryption is useto encrypt plaintext. This paper presents agent can securely sendinformation over the communication channel and protect thesending information against un-trusted hosts using hashchaining approach. Chain rule can be secure travel over thecommunication channel and certainly reach designated host."}]},"item_1583103108160":{"attribute_name":"Keywords","attribute_value":[]},"item_1583103120197":{"attribute_name":"Files","attribute_type":"file","attribute_value_mlt":[{"accessrole":"open_access","date":[{"dateType":"Available","dateValue":"2019-08-02"}],"displaytype":"preview","filename":"Sending Secured Information Over Unsecured Channel Using Hash Chaining Approach.pdf","filesize":[{"value":"10 Kb"}],"format":"application/pdf","licensetype":"license_note","mimetype":"application/pdf","url":{"url":"https://meral.edu.mm/record/3949/files/Sending Secured Information Over Unsecured Channel Using Hash Chaining Approach.pdf"},"version_id":"c4d6c571-1bd6-44e8-88f6-5a85e2973a19"}]},"item_1583103131163":{"attribute_name":"Journal articles","attribute_value_mlt":[{"subitem_issue":"","subitem_journal_title":"Third Local Conference on Parallel and Soft Computing","subitem_pages":"","subitem_volume":""}]},"item_1583103147082":{"attribute_name":"Conference papers","attribute_value_mlt":[{"subitem_acronym":"","subitem_c_date":"","subitem_conference_title":"","subitem_part":"","subitem_place":"","subitem_session":"","subitem_website":""}]},"item_1583103211336":{"attribute_name":"Books/reports/chapters","attribute_value_mlt":[{"subitem_book_title":"","subitem_isbn":"","subitem_pages":"","subitem_place":"","subitem_publisher":""}]},"item_1583103233624":{"attribute_name":"Thesis/dissertations","attribute_value_mlt":[{"subitem_awarding_university":"","subitem_supervisor(s)":[{"subitem_supervisor":""}]}]},"item_1583105942107":{"attribute_name":"Authors","attribute_value_mlt":[{"subitem_authors":[{"subitem_authors_fullname":"Tun, Nyan Min"},{"subitem_authors_fullname":"Mya, Khin Than"}]}]},"item_1583108359239":{"attribute_name":"Upload type","attribute_value_mlt":[{"interim":"Publication"}]},"item_1583108428133":{"attribute_name":"Publication type","attribute_value_mlt":[{"interim":"Article"}]},"item_1583159729339":{"attribute_name":"Publication date","attribute_value":"2009-08-03"},"item_1583159847033":{"attribute_name":"Identifier","attribute_value":"http://onlineresource.ucsy.edu.mm/handle/123456789/1666"},"item_title":"Sending Secured Information Over Unsecured Channel Using Hash Chaining Approach","item_type_id":"21","owner":"1","path":["1597824273898"],"publish_date":"2019-08-02","publish_status":"0","recid":"3949","relation_version_is_last":true,"title":["Sending Secured Information Over Unsecured Channel Using Hash Chaining Approach"],"weko_creator_id":"1","weko_shared_id":-1},"updated":"2021-12-13T01:18:10.826264+00:00"}