Log in
Language:

MERAL Myanmar Education Research and Learning Portal

  • Top
  • Universities
  • Ranking
To
lat lon distance
To

Field does not validate



Index Link

Index Tree

Please input email address.

WEKO

One fine body…

WEKO

One fine body…

Item

{"_buckets": {"deposit": "d2526623-4ac2-4ebe-af8e-7b5ce64c2bd7"}, "_deposit": {"id": "4070", "owners": [], "pid": {"revision_id": 0, "type": "recid", "value": "4070"}, "status": "published"}, "_oai": {"id": "oai:meral.edu.mm:recid/4070", "sets": ["user-ucsy"]}, "communities": ["ucsy"], "item_1583103067471": {"attribute_name": "Title", "attribute_value_mlt": [{"subitem_1551255647225": "Secure Data Transmission with Variable File Types", "subitem_1551255648112": "en"}]}, "item_1583103085720": {"attribute_name": "Description", "attribute_value_mlt": [{"interim": "Encryption is used to securely transmit data in open network. Each type of data has its own features, therefore different techniques should be used to protect confidential image data from unauthorized access. Most of the available encryption algorithms are mainly used for textual data and may not be suitable for multimedia data. Cryptographic algorithms is divided into symmetric key algorithm and asymmetric key algorithm.. The Ronal Rivest symmetric key algorithm (RC4) is a fast stream cipher with variable keylengths I to 256 bytes (8 to 2948 bits). Integrity check algorithm (CRC32) is a hash function to detect raw data. In this proposed system, we use Ronald Rivest symmetric key algorithm (RC4) for confidentiality and Integrity Check Algorithm (CRC32) for integrity for any format data such as text, image, sound, video and so on."}]}, "item_1583103108160": {"attribute_name": "Keywords", "attribute_value": []}, "item_1583103120197": {"attribute_name": "Files", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_access", "date": [{"dateType": "Available", "dateValue": "2019-08-05"}], "displaytype": "preview", "download_preview_message": "", "file_order": 0, "filename": "55173.pdf", "filesize": [{"value": "317 Kb"}], "format": "application/pdf", "future_date_message": "", "is_thumbnail": false, "licensetype": "license_free", "mimetype": "application/pdf", "size": 317000.0, "url": {"url": "https://meral.edu.mm/record/4070/files/55173.pdf"}, "version_id": "76858c8e-24c3-447f-b02d-ce5cc462e1eb"}]}, "item_1583103131163": {"attribute_name": "Journal articles", "attribute_value_mlt": [{"subitem_issue": "", "subitem_journal_title": "Fourth Local Conference on Parallel and Soft Computing", "subitem_pages": "", "subitem_volume": ""}]}, "item_1583103147082": {"attribute_name": "Conference papers", "attribute_value_mlt": [{"subitem_acronym": "", "subitem_c_date": "", "subitem_conference_title": "", "subitem_part": "", "subitem_place": "", "subitem_session": "", "subitem_website": ""}]}, "item_1583103211336": {"attribute_name": "Books/reports/chapters", "attribute_value_mlt": [{"subitem_book_title": "", "subitem_isbn": "", "subitem_pages": "", "subitem_place": "", "subitem_publisher": ""}]}, "item_1583103233624": {"attribute_name": "Thesis/dissertations", "attribute_value_mlt": [{"subitem_awarding_university": "", "subitem_supervisor(s)": [{"subitem_supervisor": ""}]}]}, "item_1583105942107": {"attribute_name": "Authors", "attribute_value_mlt": [{"subitem_authors": [{"subitem_authors_fullname": "Lai, Hnin Wut Yee"}, {"subitem_authors_fullname": "Mya, Khin Than"}]}]}, "item_1583108359239": {"attribute_name": "Upload type", "attribute_value_mlt": [{"interim": "Publication"}]}, "item_1583108428133": {"attribute_name": "Publication type", "attribute_value_mlt": [{"interim": "Article"}]}, "item_1583159729339": {"attribute_name": "Publication date", "attribute_value": "2009-12-30"}, "item_1583159847033": {"attribute_name": "Identifier", "attribute_value": "http://onlineresource.ucsy.edu.mm/handle/123456789/1776"}, "item_title": "Secure Data Transmission with Variable File Types", "item_type_id": "21", "owner": "1", "path": ["1597824273898"], "permalink_uri": "http://hdl.handle.net/20.500.12678/0000004070", "pubdate": {"attribute_name": "Deposited date", "attribute_value": "2019-08-05"}, "publish_date": "2019-08-05", "publish_status": "0", "recid": "4070", "relation": {}, "relation_version_is_last": true, "title": ["Secure Data Transmission with Variable File Types"], "weko_shared_id": -1}
  1. University of Computer Studies, Yangon
  2. Conferences

Secure Data Transmission with Variable File Types

http://hdl.handle.net/20.500.12678/0000004070
http://hdl.handle.net/20.500.12678/0000004070
2a246049-f5d3-45c2-bac0-4c496d6b4bb9
d2526623-4ac2-4ebe-af8e-7b5ce64c2bd7
None
Preview
Name / File License Actions
55173.pdf 55173.pdf (317 Kb)
Back
0
0
views
downloads
See details
Views Downloads

Versions

Ver.1 2020-09-01 14:02:52.825457
Show All versions

Share

Mendeley Twitter Facebook Print Addthis

Export

OAI-PMH
  • OAI-PMH DublinCore
Other Formats
  • JSON

Confirm


Back to MERAL


Back to MERAL