Log in
Language:

MERAL Myanmar Education Research and Learning Portal

  • Top
  • Universities
  • Ranking
To
lat lon distance
To

Field does not validate



Index Link

Index Tree

Please input email address.

WEKO

One fine body…

WEKO

One fine body…

Item

{"_buckets": {"deposit": "a8db1a19-c503-4bde-a817-062fabafd76a"}, "_deposit": {"id": "4667", "owners": [], "pid": {"revision_id": 0, "type": "recid", "value": "4667"}, "status": "published"}, "_oai": {"id": "oai:meral.edu.mm:recid/4667", "sets": ["1597824273898", "user-ucsy"]}, "communities": ["ucsy"], "item_1583103067471": {"attribute_name": "Title", "attribute_value_mlt": [{"subitem_1551255647225": "Secure Framework for e-Government Application using Short-Lived Certificate and Hybrid Encryption", "subitem_1551255648112": "en"}]}, "item_1583103085720": {"attribute_name": "Description", "attribute_value_mlt": [{"interim": "Although electronic documents have beengreatly widely used in different applicationsincluding the e-government and e-business, itwould also result that electronic documentsinformation is disclosed, counterfeited,tampered, repudiated and so on. Some of the e-Government applications may require providinguser access in short limited time. Besides thatsending and receiving back information must besecured and confidentiality and integrity must beguaranteed for the users. In order to solve theproblems and greatly improve the security ofelectronic documents, a hybrid encryptiontechnology, that is, encryption technology,digital digest, digital authentication and digitalsignature will be used. This paper proposes anapplicable solution for e-GovernmentApplications (where users only need limitedshort time access and ensure the security,confidentiality and integrity of information beingsent) by using the hybrid encryption technologytogether with a short-lived certificateframework."}]}, "item_1583103108160": {"attribute_name": "Keywords", "attribute_value_mlt": [{"interim": "electronic documents"}, {"interim": "e-Government Security"}, {"interim": "encryption technology"}, {"interim": "digital Signature"}, {"interim": "digital certificate"}, {"interim": "short-lived certificate framework"}]}, "item_1583103120197": {"attribute_name": "Files", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_access", "date": [{"dateType": "Available", "dateValue": "2019-07-03"}], "displaytype": "preview", "download_preview_message": "", "file_order": 0, "filename": "201645.pdf", "filesize": [{"value": "195 Kb"}], "format": "application/pdf", "future_date_message": "", "is_thumbnail": false, "licensetype": "license_free", "mimetype": "application/pdf", "size": 195000.0, "url": {"url": "https://meral.edu.mm/record/4667/files/201645.pdf"}, "version_id": "f7b7dfb1-f8c3-4d56-aab8-8e886c4b5780"}]}, "item_1583103131163": {"attribute_name": "Journal articles", "attribute_value_mlt": [{"subitem_issue": "", "subitem_journal_title": "Fourteenth International Conference On Computer Applications (ICCA 2016)", "subitem_pages": "", "subitem_volume": ""}]}, "item_1583103147082": {"attribute_name": "Conference papers", "attribute_value_mlt": [{"subitem_acronym": "", "subitem_c_date": "", "subitem_conference_title": "", "subitem_part": "", "subitem_place": "", "subitem_session": "", "subitem_website": ""}]}, "item_1583103211336": {"attribute_name": "Books/reports/chapters", "attribute_value_mlt": [{"subitem_book_title": "", "subitem_isbn": "", "subitem_pages": "", "subitem_place": "", "subitem_publisher": ""}]}, "item_1583103233624": {"attribute_name": "Thesis/dissertations", "attribute_value_mlt": [{"subitem_awarding_university": "", "subitem_supervisor(s)": [{"subitem_supervisor": ""}]}]}, "item_1583105942107": {"attribute_name": "Authors", "attribute_value_mlt": [{"subitem_authors": [{"subitem_authors_fullname": "Thinn, Aye Aye"}, {"subitem_authors_fullname": "Thwin, Mie Mie Su"}]}]}, "item_1583108359239": {"attribute_name": "Upload type", "attribute_value_mlt": [{"interim": "Publication"}]}, "item_1583108428133": {"attribute_name": "Publication type", "attribute_value_mlt": [{"interim": "Article"}]}, "item_1583159729339": {"attribute_name": "Publication date", "attribute_value": "2016-02-25"}, "item_1583159847033": {"attribute_name": "Identifier", "attribute_value": "http://onlineresource.ucsy.edu.mm/handle/123456789/323"}, "item_title": "Secure Framework for e-Government Application using Short-Lived Certificate and Hybrid Encryption", "item_type_id": "21", "owner": "1", "path": ["1597824273898"], "permalink_uri": "http://hdl.handle.net/20.500.12678/0000004667", "pubdate": {"attribute_name": "Deposited date", "attribute_value": "2019-07-03"}, "publish_date": "2019-07-03", "publish_status": "0", "recid": "4667", "relation": {}, "relation_version_is_last": true, "title": ["Secure Framework for e-Government Application using Short-Lived Certificate and Hybrid Encryption"], "weko_shared_id": -1}
  1. University of Computer Studies, Yangon
  2. Conferences

Secure Framework for e-Government Application using Short-Lived Certificate and Hybrid Encryption

http://hdl.handle.net/20.500.12678/0000004667
http://hdl.handle.net/20.500.12678/0000004667
0811d72f-d2d7-4af2-97cb-c64d2fc79aa0
a8db1a19-c503-4bde-a817-062fabafd76a
None
Preview
Name / File License Actions
201645.pdf 201645.pdf (195 Kb)
Publication type
Article
Upload type
Publication
Title
Title Secure Framework for e-Government Application using Short-Lived Certificate and Hybrid Encryption
Language en
Publication date 2016-02-25
Authors
Thinn, Aye Aye
Thwin, Mie Mie Su
Description
Although electronic documents have beengreatly widely used in different applicationsincluding the e-government and e-business, itwould also result that electronic documentsinformation is disclosed, counterfeited,tampered, repudiated and so on. Some of the e-Government applications may require providinguser access in short limited time. Besides thatsending and receiving back information must besecured and confidentiality and integrity must beguaranteed for the users. In order to solve theproblems and greatly improve the security ofelectronic documents, a hybrid encryptiontechnology, that is, encryption technology,digital digest, digital authentication and digitalsignature will be used. This paper proposes anapplicable solution for e-GovernmentApplications (where users only need limitedshort time access and ensure the security,confidentiality and integrity of information beingsent) by using the hybrid encryption technologytogether with a short-lived certificateframework.
Keywords
electronic documents, e-Government Security, encryption technology, digital Signature, digital certificate, short-lived certificate framework
Identifier http://onlineresource.ucsy.edu.mm/handle/123456789/323
Journal articles
Fourteenth International Conference On Computer Applications (ICCA 2016)
Conference papers
Books/reports/chapters
Thesis/dissertations
Back
0
0
views
downloads
See details
Views Downloads

Versions

Ver.1 2020-09-01 15:15:22.267187
Show All versions

Share

Mendeley Twitter Facebook Print Addthis

Export

OAI-PMH
  • OAI-PMH DublinCore
Other Formats
  • JSON

Confirm


Back to MERAL


Back to MERAL