Log in
Language:

MERAL Myanmar Education Research and Learning Portal

  • Top
  • Universities
  • Ranking
To
lat lon distance
To

Field does not validate



Index Link

Index Tree

Please input email address.

WEKO

One fine body…

WEKO

One fine body…

Item

{"_buckets": {"deposit": "32aed5bb-2113-4c0b-ae10-a586305da94b"}, "_deposit": {"id": "4196", "owners": [], "pid": {"revision_id": 0, "type": "recid", "value": "4196"}, "status": "published"}, "_oai": {"id": "oai:meral.edu.mm:recid/4196", "sets": ["user-ucsy"]}, "communities": ["ucsy"], "item_1583103067471": {"attribute_name": "Title", "attribute_value_mlt": [{"subitem_1551255647225": "Data Encryption of Audio File by using AES and RSA Algorithms", "subitem_1551255648112": "en"}]}, "item_1583103085720": {"attribute_name": "Description", "attribute_value_mlt": [{"interim": "In this age of universal electronic connectivity is needed to protect data and resources from disclosure, to guarantee the authenticity of data and messages, and to protect systems from network-based attacks. The disciplines of cryptography and network security have matured, leading to the development of practical, readily available applications to enforce network security. The cryptography is one of the ways to be data secure.This paper intends to design a security protocol using hybrid encryption technique for wave files. The hybrid encryption technique is a combination of both symmetric and asymmetric cryptographic techniques. The encryption algorithms are more secured depends on the key value and its size. But, the key distribution is major problem. The various protocols are currently given the solution. The new protocol solves the key management problem using key servers. This paper presents the encryption of wave file by AES algorithm and RSA algorithm is used to secure the AES key."}]}, "item_1583103108160": {"attribute_name": "Keywords", "attribute_value": []}, "item_1583103120197": {"attribute_name": "Files", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_access", "date": [{"dateType": "Available", "dateValue": "2019-08-06"}], "displaytype": "preview", "download_preview_message": "", "file_order": 0, "filename": "55350.pdf", "filesize": [{"value": "363 Kb"}], "format": "application/pdf", "future_date_message": "", "is_thumbnail": false, "licensetype": "license_free", "mimetype": "application/pdf", "size": 363000.0, "url": {"url": "https://meral.edu.mm/record/4196/files/55350.pdf"}, "version_id": "e15a1e52-b29e-47da-8973-03f7bfa4c4d6"}]}, "item_1583103131163": {"attribute_name": "Journal articles", "attribute_value_mlt": [{"subitem_issue": "", "subitem_journal_title": "Fourth Local Conference on Parallel and Soft Computing", "subitem_pages": "", "subitem_volume": ""}]}, "item_1583103147082": {"attribute_name": "Conference papers", "attribute_value_mlt": [{"subitem_acronym": "", "subitem_c_date": "", "subitem_conference_title": "", "subitem_part": "", "subitem_place": "", "subitem_session": "", "subitem_website": ""}]}, "item_1583103211336": {"attribute_name": "Books/reports/chapters", "attribute_value_mlt": [{"subitem_book_title": "", "subitem_isbn": "", "subitem_pages": "", "subitem_place": "", "subitem_publisher": ""}]}, "item_1583103233624": {"attribute_name": "Thesis/dissertations", "attribute_value_mlt": [{"subitem_awarding_university": "", "subitem_supervisor(s)": [{"subitem_supervisor": ""}]}]}, "item_1583105942107": {"attribute_name": "Authors", "attribute_value_mlt": [{"subitem_authors": [{"subitem_authors_fullname": "Win, Ngu War"}, {"subitem_authors_fullname": "Aye, Soe Soe"}]}]}, "item_1583108359239": {"attribute_name": "Upload type", "attribute_value_mlt": [{"interim": "Publication"}]}, "item_1583108428133": {"attribute_name": "Publication type", "attribute_value_mlt": [{"interim": "Article"}]}, "item_1583159729339": {"attribute_name": "Publication date", "attribute_value": "2009-12-30"}, "item_1583159847033": {"attribute_name": "Identifier", "attribute_value": "http://onlineresource.ucsy.edu.mm/handle/123456789/1890"}, "item_title": "Data Encryption of Audio File by using AES and RSA Algorithms", "item_type_id": "21", "owner": "1", "path": ["1597824273898"], "permalink_uri": "http://hdl.handle.net/20.500.12678/0000004196", "pubdate": {"attribute_name": "Deposited date", "attribute_value": "2019-08-06"}, "publish_date": "2019-08-06", "publish_status": "0", "recid": "4196", "relation": {}, "relation_version_is_last": true, "title": ["Data Encryption of Audio File by using AES and RSA Algorithms"], "weko_shared_id": -1}
  1. University of Computer Studies, Yangon
  2. Conferences

Data Encryption of Audio File by using AES and RSA Algorithms

http://hdl.handle.net/20.500.12678/0000004196
http://hdl.handle.net/20.500.12678/0000004196
1626f3f5-58ca-451f-999c-c1f72db11358
32aed5bb-2113-4c0b-ae10-a586305da94b
None
Preview
Name / File License Actions
55350.pdf 55350.pdf (363 Kb)
Back
0
0
views
downloads
See details
Views Downloads

Versions

Ver.1 2020-09-01 14:19:51.098235
Show All versions

Share

Mendeley Twitter Facebook Print Addthis

Export

OAI-PMH
  • OAI-PMH DublinCore
Other Formats
  • JSON

Confirm


Back to MERAL


Back to MERAL