Index Link

  • RootNode
    • Co-operative College, Mandalay
    • Cooperative College, Phaunggyi
    • Co-operative University, Sagaing
    • Co-operative University, Thanlyin
    • Dagon University
    • Kyaukse University
    • Laquarware Technological college
    • Mandalay Technological University
    • Mandalay University of Distance Education
    • Mandalay University of Foreign Languages
    • Maubin University
    • Mawlamyine University
    • Meiktila University
    • Mohnyin University
    • Myanmar Institute of Information Technology
    • Myanmar Maritime University
    • National Management Degree College
    • Naypyitaw State Academy
    • Pathein University
    • Sagaing University
    • Sagaing University of Education
    • Taunggyi University
    • Technological University, Hmawbi
    • Technological University (Kyaukse)
    • Technological University Mandalay
    • University of Computer Studies, Mandalay
    • University of Computer Studies Maubin
    • University of Computer Studies, Meikhtila
    • University of Computer Studies Pathein
    • University of Computer Studies, Taungoo
    • University of Computer Studies, Yangon
    • University of Dental Medicine Mandalay
    • University of Dental Medicine, Yangon
    • University of Information Technology
    • University of Mandalay
    • University of Medicine 1
    • University of Medicine 2
    • University of Medicine Mandalay
    • University of Myitkyina
    • University of Public Health, Yangon
    • University of Veterinary Science
    • University of Yangon
    • West Yangon University
    • Yadanabon University
    • Yangon Technological University
    • Yangon University of Distance Education
    • Yangon University of Economics
    • Yangon University of Education
    • Yangon University of Foreign Languages
    • Yezin Agricultural University
    • New Index

Item

{"_buckets": {"deposit": "01fd8d3b-321a-4b27-83e3-28a03382df6b"}, "_deposit": {"id": "3969", "owners": [], "pid": {"revision_id": 0, "type": "recid", "value": "3969"}, "status": "published"}, "_oai": {"id": "oai:meral.edu.mm:recid/3969", "sets": ["user-ucsy"]}, "communities": ["ucsy"], "item_1583103067471": {"attribute_name": "Title", "attribute_value_mlt": [{"subitem_1551255647225": "Secure File Sharing System By verifying Data with Hash Algorithm", "subitem_1551255648112": "en"}]}, "item_1583103085720": {"attribute_name": "Description", "attribute_value_mlt": [{"interim": "The security of information is the most important factor of information technology and communication. Many different methods have been developed to encrypt and decrypt data in order to keep the message secret. Besides, it is needed to verify whether the received data is from right sender or not because malicious user can change the data between data transmission processes. This system is a secure data sending system. In this system, firstly, Asymmetric Algorithm (Diffie-Hellman) is used to produce the symmetric key that will be used in data encryption/decryption process. Next, the system uses Symmetric Algorithm (AES) to encrypt/decrypt file. Furthermore, the system includes the data checking process in which the received data will be checked whether it has been changed on the way or not by using Secure Hash Algorithm (SHA)."}]}, "item_1583103108160": {"attribute_name": "Keywords", "attribute_value_mlt": [{"interim": "Diffie-Hellman Key Exchange"}, {"interim": "Advanced Encryption Standard (AES)"}, {"interim": "Secure Hash Algorithm (SHA)"}]}, "item_1583103120197": {"attribute_name": "Files", "attribute_type": "file", "attribute_value": []}, "item_1583103131163": {"attribute_name": "Journal articles", "attribute_value_mlt": [{"subitem_issue": "", "subitem_journal_title": "Fourth Local Conference on Parallel and Soft Computing", "subitem_pages": "", "subitem_volume": ""}]}, "item_1583103147082": {"attribute_name": "Conference papers", "attribute_value_mlt": [{"subitem_acronym": "", "subitem_c_date": "", "subitem_conference_title": "", "subitem_part": "", "subitem_place": "", "subitem_session": "", "subitem_website": ""}]}, "item_1583103211336": {"attribute_name": "Books/reports/chapters", "attribute_value_mlt": [{"subitem_book_title": "", "subitem_isbn": "", "subitem_pages": "", "subitem_place": "", "subitem_publisher": ""}]}, "item_1583103233624": {"attribute_name": "Thesis/dissertations", "attribute_value_mlt": [{"subitem_awarding_university": "", "subitem_supervisor(s)": [{"subitem_supervisor": ""}]}]}, "item_1583105942107": {"attribute_name": "Authors", "attribute_value_mlt": [{"subitem_authors": [{"subitem_authors_fullname": "Mon, Kaung Myat"}, {"subitem_authors_fullname": "Khaing, Thiri Thitsar"}]}]}, "item_1583108359239": {"attribute_name": "Upload type", "attribute_value_mlt": [{"interim": "Publication"}]}, "item_1583108428133": {"attribute_name": "Publication type", "attribute_value_mlt": [{"interim": "Article"}]}, "item_1583159729339": {"attribute_name": "Publication date", "attribute_value": "2009-12-30"}, "item_1583159847033": {"attribute_name": "Identifier", "attribute_value": "http://onlineresource.ucsy.edu.mm/handle/123456789/1684"}, "item_title": "Secure File Sharing System By verifying Data with Hash Algorithm", "item_type_id": "21", "owner": "1", "path": ["1597824273898"], "permalink_uri": "http://hdl.handle.net/20.500.12678/0000003969", "pubdate": {"attribute_name": "Deposited date", "attribute_value": "2019-08-03"}, "publish_date": "2019-08-03", "publish_status": "0", "recid": "3969", "relation": {}, "relation_version_is_last": true, "title": ["Secure File Sharing System By verifying Data with Hash Algorithm"], "weko_shared_id": -1}

Secure File Sharing System By verifying Data with Hash Algorithm

http://hdl.handle.net/20.500.12678/0000003969
57e700ba-9fc2-4b0c-8711-d17d002e4261
01fd8d3b-321a-4b27-83e3-28a03382df6b
Publication type
Article
Upload type
Publication
Title
Title Secure File Sharing System By verifying Data with Hash Algorithm
Language en
Publication date 2009-12-30
Authors
Mon, Kaung Myat
Khaing, Thiri Thitsar
Description
The security of information is the most important factor of information technology and communication. Many different methods have been developed to encrypt and decrypt data in order to keep the message secret. Besides, it is needed to verify whether the received data is from right sender or not because malicious user can change the data between data transmission processes. This system is a secure data sending system. In this system, firstly, Asymmetric Algorithm (Diffie-Hellman) is used to produce the symmetric key that will be used in data encryption/decryption process. Next, the system uses Symmetric Algorithm (AES) to encrypt/decrypt file. Furthermore, the system includes the data checking process in which the received data will be checked whether it has been changed on the way or not by using Secure Hash Algorithm (SHA).
Keywords
Diffie-Hellman Key Exchange, Advanced Encryption Standard (AES), Secure Hash Algorithm (SHA)
Identifier http://onlineresource.ucsy.edu.mm/handle/123456789/1684
Journal articles
Fourth Local Conference on Parallel and Soft Computing
Conference papers
Books/reports/chapters
Thesis/dissertations
0
0
views
downloads
Views Downloads

Export

OAI-PMH
  • OAI-PMH DublinCore
Other Formats