Log in
Language:

MERAL Myanmar Education Research and Learning Portal

  • Top
  • Universities
  • Ranking
To
lat lon distance
To

Field does not validate



Index Link

Index Tree

Please input email address.

WEKO

One fine body…

WEKO

One fine body…

Item

{"_buckets": {"deposit": "857463f0-bbaa-4e00-8ca3-d8c94b091926"}, "_deposit": {"id": "4102", "owners": [], "pid": {"revision_id": 0, "type": "recid", "value": "4102"}, "status": "published"}, "_oai": {"id": "oai:meral.edu.mm:recid/4102", "sets": ["user-ucsy"]}, "communities": ["ucsy"], "item_1583103067471": {"attribute_name": "Title", "attribute_value_mlt": [{"subitem_1551255647225": "Improving the Security in Wireless Network System Using NTRU", "subitem_1551255648112": "en"}]}, "item_1583103085720": {"attribute_name": "Description", "attribute_value_mlt": [{"interim": "Reliable technology is not enough to ensure the security for the many application systems. Such several reliability deficiencies become the vital part of the security level in today wireless technology. Efficient cryptographic techniques are necessary to endow the security level in wireless network system. NTRU becomes the fastest and smallest public-key security solutions for wireless technologies and applications. In Advanced Number Theory Research Unit (NTRU) Public key Cryptosystem (PKCS) is composed with mainly three parameters: N is the polynomials of the truncated polynomial ring have degree N-1, p is small modulus which can reduce the coefficient of the message at the decryption process and q is large modulus which can reduce the coefficient of the truncated polynomial. In this paper, we analyze to improve the security in wireless network system by applying four security levels such as moderate, standard, high, and highest of Advanced NTRU."}]}, "item_1583103108160": {"attribute_name": "Keywords", "attribute_value_mlt": [{"interim": "Advanced NTRU"}, {"interim": "PKCS"}, {"interim": "wireless"}, {"interim": "security level"}]}, "item_1583103120197": {"attribute_name": "Files", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_access", "date": [{"dateType": "Available", "dateValue": "2019-08-05"}], "displaytype": "preview", "download_preview_message": "", "file_order": 0, "filename": "55224.pdf", "filesize": [{"value": "583 Kb"}], "format": "application/pdf", "future_date_message": "", "is_thumbnail": false, "licensetype": "license_free", "mimetype": "application/pdf", "size": 583000.0, "url": {"url": "https://meral.edu.mm/record/4102/files/55224.pdf"}, "version_id": "2ea3d320-63ab-45c4-bffd-0a38e277d449"}]}, "item_1583103131163": {"attribute_name": "Journal articles", "attribute_value_mlt": [{"subitem_issue": "", "subitem_journal_title": "Fourth Local Conference on Parallel and Soft Computing", "subitem_pages": "", "subitem_volume": ""}]}, "item_1583103147082": {"attribute_name": "Conference papers", "attribute_value_mlt": [{"subitem_acronym": "", "subitem_c_date": "", "subitem_conference_title": "", "subitem_part": "", "subitem_place": "", "subitem_session": "", "subitem_website": ""}]}, "item_1583103211336": {"attribute_name": "Books/reports/chapters", "attribute_value_mlt": [{"subitem_book_title": "", "subitem_isbn": "", "subitem_pages": "", "subitem_place": "", "subitem_publisher": ""}]}, "item_1583103233624": {"attribute_name": "Thesis/dissertations", "attribute_value_mlt": [{"subitem_awarding_university": "", "subitem_supervisor(s)": [{"subitem_supervisor": ""}]}]}, "item_1583105942107": {"attribute_name": "Authors", "attribute_value_mlt": [{"subitem_authors": [{"subitem_authors_fullname": "Tin, Myat Mon"}, {"subitem_authors_fullname": "San, Kalyar Myo"}]}]}, "item_1583108359239": {"attribute_name": "Upload type", "attribute_value_mlt": [{"interim": "Publication"}]}, "item_1583108428133": {"attribute_name": "Publication type", "attribute_value_mlt": [{"interim": "Article"}]}, "item_1583159729339": {"attribute_name": "Publication date", "attribute_value": "2009-12-30"}, "item_1583159847033": {"attribute_name": "Identifier", "attribute_value": "http://onlineresource.ucsy.edu.mm/handle/123456789/1805"}, "item_title": "Improving the Security in Wireless Network System Using NTRU", "item_type_id": "21", "owner": "1", "path": ["1597824273898"], "permalink_uri": "http://hdl.handle.net/20.500.12678/0000004102", "pubdate": {"attribute_name": "Deposited date", "attribute_value": "2019-08-05"}, "publish_date": "2019-08-05", "publish_status": "0", "recid": "4102", "relation": {}, "relation_version_is_last": true, "title": ["Improving the Security in Wireless Network System Using NTRU"], "weko_shared_id": -1}
  1. University of Computer Studies, Yangon
  2. Conferences

Improving the Security in Wireless Network System Using NTRU

http://hdl.handle.net/20.500.12678/0000004102
http://hdl.handle.net/20.500.12678/0000004102
5c51bd13-0c10-45f1-8209-07f69f28af75
857463f0-bbaa-4e00-8ca3-d8c94b091926
None
Preview
Name / File License Actions
55224.pdf 55224.pdf (583 Kb)
Publication type
Article
Upload type
Publication
Title
Title Improving the Security in Wireless Network System Using NTRU
Language en
Publication date 2009-12-30
Authors
Tin, Myat Mon
San, Kalyar Myo
Description
Reliable technology is not enough to ensure the security for the many application systems. Such several reliability deficiencies become the vital part of the security level in today wireless technology. Efficient cryptographic techniques are necessary to endow the security level in wireless network system. NTRU becomes the fastest and smallest public-key security solutions for wireless technologies and applications. In Advanced Number Theory Research Unit (NTRU) Public key Cryptosystem (PKCS) is composed with mainly three parameters: N is the polynomials of the truncated polynomial ring have degree N-1, p is small modulus which can reduce the coefficient of the message at the decryption process and q is large modulus which can reduce the coefficient of the truncated polynomial. In this paper, we analyze to improve the security in wireless network system by applying four security levels such as moderate, standard, high, and highest of Advanced NTRU.
Keywords
Advanced NTRU, PKCS, wireless, security level
Identifier http://onlineresource.ucsy.edu.mm/handle/123456789/1805
Journal articles
Fourth Local Conference on Parallel and Soft Computing
Conference papers
Books/reports/chapters
Thesis/dissertations
Back
0
0
views
downloads
See details
Views Downloads

Versions

Ver.1 2020-09-01 14:07:19.552815
Show All versions

Share

Mendeley Twitter Facebook Print Addthis

Export

OAI-PMH
  • OAI-PMH DublinCore
Other Formats
  • JSON

Confirm


Back to MERAL


Back to MERAL