Log in
Language:

MERAL Myanmar Education Research and Learning Portal

  • Top
  • Universities
  • Ranking
To
lat lon distance
To

Field does not validate



Index Link

Index Tree

Please input email address.

WEKO

One fine body…

WEKO

One fine body…

Item

{"_buckets": {"deposit": "01fd8d3b-321a-4b27-83e3-28a03382df6b"}, "_deposit": {"id": "3969", "owners": [], "pid": {"revision_id": 0, "type": "recid", "value": "3969"}, "status": "published"}, "_oai": {"id": "oai:meral.edu.mm:recid/3969", "sets": ["user-ucsy"]}, "communities": ["ucsy"], "item_1583103067471": {"attribute_name": "Title", "attribute_value_mlt": [{"subitem_1551255647225": "Secure File Sharing System By verifying Data with Hash Algorithm", "subitem_1551255648112": "en"}]}, "item_1583103085720": {"attribute_name": "Description", "attribute_value_mlt": [{"interim": "The security of information is the most important factor of information technology and communication. Many different methods have been developed to encrypt and decrypt data in order to keep the message secret. Besides, it is needed to verify whether the received data is from right sender or not because malicious user can change the data between data transmission processes. This system is a secure data sending system. In this system, firstly, Asymmetric Algorithm (Diffie-Hellman) is used to produce the symmetric key that will be used in data encryption/decryption process. Next, the system uses Symmetric Algorithm (AES) to encrypt/decrypt file. Furthermore, the system includes the data checking process in which the received data will be checked whether it has been changed on the way or not by using Secure Hash Algorithm (SHA)."}]}, "item_1583103108160": {"attribute_name": "Keywords", "attribute_value_mlt": [{"interim": "Diffie-Hellman Key Exchange"}, {"interim": "Advanced Encryption Standard (AES)"}, {"interim": "Secure Hash Algorithm (SHA)"}]}, "item_1583103120197": {"attribute_name": "Files", "attribute_type": "file", "attribute_value": []}, "item_1583103131163": {"attribute_name": "Journal articles", "attribute_value_mlt": [{"subitem_issue": "", "subitem_journal_title": "Fourth Local Conference on Parallel and Soft Computing", "subitem_pages": "", "subitem_volume": ""}]}, "item_1583103147082": {"attribute_name": "Conference papers", "attribute_value_mlt": [{"subitem_acronym": "", "subitem_c_date": "", "subitem_conference_title": "", "subitem_part": "", "subitem_place": "", "subitem_session": "", "subitem_website": ""}]}, "item_1583103211336": {"attribute_name": "Books/reports/chapters", "attribute_value_mlt": [{"subitem_book_title": "", "subitem_isbn": "", "subitem_pages": "", "subitem_place": "", "subitem_publisher": ""}]}, "item_1583103233624": {"attribute_name": "Thesis/dissertations", "attribute_value_mlt": [{"subitem_awarding_university": "", "subitem_supervisor(s)": [{"subitem_supervisor": ""}]}]}, "item_1583105942107": {"attribute_name": "Authors", "attribute_value_mlt": [{"subitem_authors": [{"subitem_authors_fullname": "Mon, Kaung Myat"}, {"subitem_authors_fullname": "Khaing, Thiri Thitsar"}]}]}, "item_1583108359239": {"attribute_name": "Upload type", "attribute_value_mlt": [{"interim": "Publication"}]}, "item_1583108428133": {"attribute_name": "Publication type", "attribute_value_mlt": [{"interim": "Article"}]}, "item_1583159729339": {"attribute_name": "Publication date", "attribute_value": "2009-12-30"}, "item_1583159847033": {"attribute_name": "Identifier", "attribute_value": "http://onlineresource.ucsy.edu.mm/handle/123456789/1684"}, "item_title": "Secure File Sharing System By verifying Data with Hash Algorithm", "item_type_id": "21", "owner": "1", "path": ["1597824273898"], "permalink_uri": "http://hdl.handle.net/20.500.12678/0000003969", "pubdate": {"attribute_name": "Deposited date", "attribute_value": "2019-08-03"}, "publish_date": "2019-08-03", "publish_status": "0", "recid": "3969", "relation": {}, "relation_version_is_last": true, "title": ["Secure File Sharing System By verifying Data with Hash Algorithm"], "weko_shared_id": -1}
  1. University of Computer Studies, Yangon
  2. Conferences

Secure File Sharing System By verifying Data with Hash Algorithm

http://hdl.handle.net/20.500.12678/0000003969
http://hdl.handle.net/20.500.12678/0000003969
57e700ba-9fc2-4b0c-8711-d17d002e4261
01fd8d3b-321a-4b27-83e3-28a03382df6b
Publication type
Article
Upload type
Publication
Title
Title Secure File Sharing System By verifying Data with Hash Algorithm
Language en
Publication date 2009-12-30
Authors
Mon, Kaung Myat
Khaing, Thiri Thitsar
Description
The security of information is the most important factor of information technology and communication. Many different methods have been developed to encrypt and decrypt data in order to keep the message secret. Besides, it is needed to verify whether the received data is from right sender or not because malicious user can change the data between data transmission processes. This system is a secure data sending system. In this system, firstly, Asymmetric Algorithm (Diffie-Hellman) is used to produce the symmetric key that will be used in data encryption/decryption process. Next, the system uses Symmetric Algorithm (AES) to encrypt/decrypt file. Furthermore, the system includes the data checking process in which the received data will be checked whether it has been changed on the way or not by using Secure Hash Algorithm (SHA).
Keywords
Diffie-Hellman Key Exchange, Advanced Encryption Standard (AES), Secure Hash Algorithm (SHA)
Identifier http://onlineresource.ucsy.edu.mm/handle/123456789/1684
Journal articles
Fourth Local Conference on Parallel and Soft Computing
Conference papers
Books/reports/chapters
Thesis/dissertations
Back
0
0
views
downloads
See details
Views Downloads

Versions

Ver.1 2020-09-01 13:49:30.906231
Show All versions

Share

Mendeley Twitter Facebook Print Addthis

Export

OAI-PMH
  • OAI-PMH DublinCore
Other Formats
  • JSON

Confirm


Back to MERAL


Back to MERAL