Log in
Language:

MERAL Myanmar Education Research and Learning Portal

  • Top
  • Universities
  • Ranking
To
lat lon distance
To

Field does not validate



Index Link

Index Tree

Please input email address.

WEKO

One fine body…

WEKO

One fine body…

Item

{"_buckets": {"deposit": "e028b522-30a6-4ebb-9a97-d502fcb1cb43"}, "_deposit": {"id": "4841", "owners": [], "pid": {"revision_id": 0, "type": "recid", "value": "4841"}, "status": "published"}, "_oai": {"id": "oai:meral.edu.mm:recid/4841", "sets": ["user-ucsy"]}, "communities": ["ucsy"], "item_1583103067471": {"attribute_name": "Title", "attribute_value_mlt": [{"subitem_1551255647225": "Study on Symmetric and Asymmetric Cryptographic Techniques", "subitem_1551255648112": "en"}]}, "item_1583103085720": {"attribute_name": "Description", "attribute_value_mlt": [{"interim": "Data security is the challenging issue in todaysworld that touches many areas using computercommunication. Recent cyber security attacks havecertainly played with the sentiments of the users [9].Encryption is one of the ways to protect data fromunauthorized access and is used in many fields such asmedical science, military and diplomaticcommunication. To achieve data security, differentcryptographic algorithms (symmetric and asymmetric)are used that jumbles data into scribbled format thatcan only be reversed by the user that has to decryptkey. This paper study on existing cryptographicalgorithms and also gives the advantages anddisadvantages of symmetric and asymmetric encryptiontechniques."}]}, "item_1583103108160": {"attribute_name": "Keywords", "attribute_value": []}, "item_1583103120197": {"attribute_name": "Files", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_access", "date": [{"dateType": "Available", "dateValue": "2019-07-02"}], "displaytype": "preview", "download_preview_message": "", "file_order": 0, "filename": "1.Study on Symmetric and Asymmetric Cryptographic Techniques.pdf", "filesize": [{"value": "68 Kb"}], "format": "application/pdf", "future_date_message": "", "is_thumbnail": false, "licensetype": "license_free", "mimetype": "application/pdf", "size": 68000.0, "url": {"url": "https://meral.edu.mm/record/4841/files/1.Study on Symmetric and Asymmetric Cryptographic Techniques.pdf"}, "version_id": "b6d42bb2-9d2c-4cf7-ae91-defc82c4879b"}]}, "item_1583103131163": {"attribute_name": "Journal articles", "attribute_value_mlt": [{"subitem_issue": "", "subitem_journal_title": "Thirteenth International Conferences on Computer Applications(ICCA 2015)", "subitem_pages": "", "subitem_volume": ""}]}, "item_1583103147082": {"attribute_name": "Conference papers", "attribute_value_mlt": [{"subitem_acronym": "", "subitem_c_date": "", "subitem_conference_title": "", "subitem_part": "", "subitem_place": "", "subitem_session": "", "subitem_website": ""}]}, "item_1583103211336": {"attribute_name": "Books/reports/chapters", "attribute_value_mlt": [{"subitem_book_title": "", "subitem_isbn": "", "subitem_pages": "", "subitem_place": "", "subitem_publisher": ""}]}, "item_1583103233624": {"attribute_name": "Thesis/dissertations", "attribute_value_mlt": [{"subitem_awarding_university": "", "subitem_supervisor(s)": [{"subitem_supervisor": ""}]}]}, "item_1583105942107": {"attribute_name": "Authors", "attribute_value_mlt": [{"subitem_authors": [{"subitem_authors_fullname": "Aung, May Aye Chan"}, {"subitem_authors_fullname": "Wai, Myat Su"}]}]}, "item_1583108359239": {"attribute_name": "Upload type", "attribute_value_mlt": [{"interim": "Publication"}]}, "item_1583108428133": {"attribute_name": "Publication type", "attribute_value_mlt": [{"interim": "Article"}]}, "item_1583159729339": {"attribute_name": "Publication date", "attribute_value": "2015-02-05"}, "item_1583159847033": {"attribute_name": "Identifier", "attribute_value": "http://onlineresource.ucsy.edu.mm/handle/123456789/74"}, "item_title": "Study on Symmetric and Asymmetric Cryptographic Techniques", "item_type_id": "21", "owner": "1", "path": ["1597824273898"], "permalink_uri": "http://hdl.handle.net/20.500.12678/0000004841", "pubdate": {"attribute_name": "Deposited date", "attribute_value": "2019-07-02"}, "publish_date": "2019-07-02", "publish_status": "0", "recid": "4841", "relation": {}, "relation_version_is_last": true, "title": ["Study on Symmetric and Asymmetric Cryptographic Techniques"], "weko_shared_id": -1}
  1. University of Computer Studies, Yangon
  2. Conferences

Study on Symmetric and Asymmetric Cryptographic Techniques

http://hdl.handle.net/20.500.12678/0000004841
http://hdl.handle.net/20.500.12678/0000004841
c2e552fe-d497-429a-b860-a8ce75dec5c9
e028b522-30a6-4ebb-9a97-d502fcb1cb43
None
Preview
Name / File License Actions
1.Study 1.Study on Symmetric and Asymmetric Cryptographic Techniques.pdf (68 Kb)
Back
0
0
views
downloads
See details
Views Downloads

Versions

Ver.1 2020-09-01 15:24:00.999288
Show All versions

Share

Mendeley Twitter Facebook Print Addthis

Export

OAI-PMH
  • OAI-PMH DublinCore
Other Formats
  • JSON

Confirm


Back to MERAL


Back to MERAL