{"created":"2020-09-01T15:23:59.586972+00:00","id":4841,"links":{},"metadata":{"_buckets":{"deposit":"e028b522-30a6-4ebb-9a97-d502fcb1cb43"},"_deposit":{"id":"4841","owners":[],"pid":{"revision_id":0,"type":"recid","value":"4841"},"status":"published"},"_oai":{"id":"oai:meral.edu.mm:recid/4841","sets":["1582963302567:1597824273898"]},"communities":["ucsy"],"item_1583103067471":{"attribute_name":"Title","attribute_value_mlt":[{"subitem_1551255647225":"Study on Symmetric and Asymmetric Cryptographic Techniques","subitem_1551255648112":"en"}]},"item_1583103085720":{"attribute_name":"Description","attribute_value_mlt":[{"interim":"Data security is the challenging issue in todaysworld that touches many areas using computercommunication. Recent cyber security attacks havecertainly played with the sentiments of the users [9].Encryption is one of the ways to protect data fromunauthorized access and is used in many fields such asmedical science, military and diplomaticcommunication. To achieve data security, differentcryptographic algorithms (symmetric and asymmetric)are used that jumbles data into scribbled format thatcan only be reversed by the user that has to decryptkey. This paper study on existing cryptographicalgorithms and also gives the advantages anddisadvantages of symmetric and asymmetric encryptiontechniques."}]},"item_1583103108160":{"attribute_name":"Keywords","attribute_value":[]},"item_1583103120197":{"attribute_name":"Files","attribute_type":"file","attribute_value_mlt":[{"accessrole":"open_access","date":[{"dateType":"Available","dateValue":"2019-07-02"}],"displaytype":"preview","filename":"1.Study on Symmetric and Asymmetric Cryptographic Techniques.pdf","filesize":[{"value":"68 Kb"}],"format":"application/pdf","licensetype":"license_note","mimetype":"application/pdf","url":{"url":"https://meral.edu.mm/record/4841/files/1.Study on Symmetric and Asymmetric Cryptographic Techniques.pdf"},"version_id":"b6d42bb2-9d2c-4cf7-ae91-defc82c4879b"}]},"item_1583103131163":{"attribute_name":"Journal articles","attribute_value_mlt":[{"subitem_issue":"","subitem_journal_title":"Thirteenth International Conferences on Computer Applications(ICCA 2015)","subitem_pages":"","subitem_volume":""}]},"item_1583103147082":{"attribute_name":"Conference papers","attribute_value_mlt":[{"subitem_acronym":"","subitem_c_date":"","subitem_conference_title":"","subitem_part":"","subitem_place":"","subitem_session":"","subitem_website":""}]},"item_1583103211336":{"attribute_name":"Books/reports/chapters","attribute_value_mlt":[{"subitem_book_title":"","subitem_isbn":"","subitem_pages":"","subitem_place":"","subitem_publisher":""}]},"item_1583103233624":{"attribute_name":"Thesis/dissertations","attribute_value_mlt":[{"subitem_awarding_university":"","subitem_supervisor(s)":[{"subitem_supervisor":""}]}]},"item_1583105942107":{"attribute_name":"Authors","attribute_value_mlt":[{"subitem_authors":[{"subitem_authors_fullname":"Aung, May Aye Chan"},{"subitem_authors_fullname":"Wai, Myat Su"}]}]},"item_1583108359239":{"attribute_name":"Upload type","attribute_value_mlt":[{"interim":"Publication"}]},"item_1583108428133":{"attribute_name":"Publication type","attribute_value_mlt":[{"interim":"Article"}]},"item_1583159729339":{"attribute_name":"Publication date","attribute_value":"2015-02-05"},"item_1583159847033":{"attribute_name":"Identifier","attribute_value":"http://onlineresource.ucsy.edu.mm/handle/123456789/74"},"item_title":"Study on Symmetric and Asymmetric Cryptographic Techniques","item_type_id":"21","owner":"1","path":["1597824273898"],"publish_date":"2019-07-02","publish_status":"0","recid":"4841","relation_version_is_last":true,"title":["Study on Symmetric and Asymmetric Cryptographic Techniques"],"weko_creator_id":"1","weko_shared_id":-1},"updated":"2021-12-13T06:21:19.745776+00:00"}