{"created":"2020-09-01T14:02:49.954400+00:00","id":4070,"links":{},"metadata":{"_buckets":{"deposit":"d2526623-4ac2-4ebe-af8e-7b5ce64c2bd7"},"_deposit":{"id":"4070","owners":[],"pid":{"revision_id":0,"type":"recid","value":"4070"},"status":"published"},"_oai":{"id":"oai:meral.edu.mm:recid/4070","sets":["1582963302567:1597824273898"]},"communities":["ucsy"],"item_1583103067471":{"attribute_name":"Title","attribute_value_mlt":[{"subitem_1551255647225":"Secure Data Transmission with Variable File Types","subitem_1551255648112":"en"}]},"item_1583103085720":{"attribute_name":"Description","attribute_value_mlt":[{"interim":"Encryption is used to securely transmit data in open network. Each type of data has its own features, therefore different techniques should be used to protect confidential image data from unauthorized access. Most of the available encryption algorithms are mainly used for textual data and may not be suitable for multimedia data. Cryptographic algorithms is divided into symmetric key algorithm and asymmetric key algorithm.. The Ronal Rivest symmetric key algorithm (RC4) is a fast stream cipher with variable keylengths I to 256 bytes (8 to 2948 bits). Integrity check algorithm (CRC32) is a hash function to detect raw data. In this proposed system, we use Ronald Rivest symmetric key algorithm (RC4) for confidentiality and Integrity Check Algorithm (CRC32) for integrity for any format data such as text, image, sound, video and so on."}]},"item_1583103108160":{"attribute_name":"Keywords","attribute_value":[]},"item_1583103120197":{"attribute_name":"Files","attribute_type":"file","attribute_value_mlt":[{"accessrole":"open_access","date":[{"dateType":"Available","dateValue":"2019-08-05"}],"displaytype":"preview","filename":"55173.pdf","filesize":[{"value":"317 Kb"}],"format":"application/pdf","licensetype":"license_note","mimetype":"application/pdf","url":{"url":"https://meral.edu.mm/record/4070/files/55173.pdf"},"version_id":"76858c8e-24c3-447f-b02d-ce5cc462e1eb"}]},"item_1583103131163":{"attribute_name":"Journal articles","attribute_value_mlt":[{"subitem_issue":"","subitem_journal_title":"Fourth Local Conference on Parallel and Soft Computing","subitem_pages":"","subitem_volume":""}]},"item_1583103147082":{"attribute_name":"Conference papers","attribute_value_mlt":[{"subitem_acronym":"","subitem_c_date":"","subitem_conference_title":"","subitem_part":"","subitem_place":"","subitem_session":"","subitem_website":""}]},"item_1583103211336":{"attribute_name":"Books/reports/chapters","attribute_value_mlt":[{"subitem_book_title":"","subitem_isbn":"","subitem_pages":"","subitem_place":"","subitem_publisher":""}]},"item_1583103233624":{"attribute_name":"Thesis/dissertations","attribute_value_mlt":[{"subitem_awarding_university":"","subitem_supervisor(s)":[{"subitem_supervisor":""}]}]},"item_1583105942107":{"attribute_name":"Authors","attribute_value_mlt":[{"subitem_authors":[{"subitem_authors_fullname":"Lai, Hnin Wut Yee"},{"subitem_authors_fullname":"Mya, Khin Than"}]}]},"item_1583108359239":{"attribute_name":"Upload type","attribute_value_mlt":[{"interim":"Publication"}]},"item_1583108428133":{"attribute_name":"Publication type","attribute_value_mlt":[{"interim":"Article"}]},"item_1583159729339":{"attribute_name":"Publication date","attribute_value":"2009-12-30"},"item_1583159847033":{"attribute_name":"Identifier","attribute_value":"http://onlineresource.ucsy.edu.mm/handle/123456789/1776"},"item_title":"Secure Data Transmission with Variable File Types","item_type_id":"21","owner":"1","path":["1597824273898"],"publish_date":"2019-08-05","publish_status":"0","recid":"4070","relation_version_is_last":true,"title":["Secure Data Transmission with Variable File Types"],"weko_creator_id":"1","weko_shared_id":-1},"updated":"2021-12-13T01:21:50.665701+00:00"}