Log in
Language:

MERAL Myanmar Education Research and Learning Portal

  • Top
  • Universities
  • Ranking
To
lat lon distance
To

Field does not validate



Index Link

Index Tree

Please input email address.

WEKO

One fine body…

WEKO

One fine body…

Item

{"_buckets": {"deposit": "653cbb9f-9858-402d-8c27-fb1e4da158ca"}, "_deposit": {"id": "4962", "owners": [], "pid": {"revision_id": 0, "type": "recid", "value": "4962"}, "status": "published"}, "_oai": {"id": "oai:meral.edu.mm:recid/4962", "sets": ["1597824273898", "user-ucsy"]}, "communities": ["ucsy"], "item_1583103067471": {"attribute_name": "Title", "attribute_value_mlt": [{"subitem_1551255647225": "SEC: Security Control System for the Integration of Mobile Agent and Web Services based on Certificateless Cryptography and Two Party Hashing Key Agreement Protocol", "subitem_1551255648112": "en"}]}, "item_1583103085720": {"attribute_name": "Description", "attribute_value_mlt": [{"interim": "Security is a major concern for wide applications in large hostile networks like internet. More and More people are willing to access information anytime and anywhere. The advances in mobile devices and wireless networks lead to requirements to tackle the problems like high error rates and frequent disconnections. Currently, the two modern technologies: Mobile Agents and Web Services are used altogether to achieve ubiquitous service access. As a result of applications using combination of mobile agent and web services, security becomes a big concern for applications. The integration of mobile agent and cryptography technologies provide benefits such as improved accessibility wirelessly and increased security. In this paper, SEC (Security Control) System to control the security of the integrated Mobile Agent and Web Services based on certificateless cryptography and (TPHK), two party hashing key agreement protocol, is proposed."}]}, "item_1583103108160": {"attribute_name": "Keywords", "attribute_value_mlt": [{"interim": "mobile agent"}, {"interim": "web service"}, {"interim": "certificateless cryptography"}, {"interim": "key agreement protocol"}, {"interim": "security control system"}]}, "item_1583103120197": {"attribute_name": "Files", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_access", "date": [{"dateType": "Available", "dateValue": "2019-07-12"}], "displaytype": "preview", "download_preview_message": "", "file_order": 0, "filename": "11096.pdf", "filesize": [{"value": "457 Kb"}], "format": "application/pdf", "future_date_message": "", "is_thumbnail": false, "licensetype": "license_free", "mimetype": "application/pdf", "size": 457000.0, "url": {"url": "https://meral.edu.mm/record/4962/files/11096.pdf"}, "version_id": "e85c4920-8912-4f26-ae7b-3670e97c06c9"}]}, "item_1583103131163": {"attribute_name": "Journal articles", "attribute_value_mlt": [{"subitem_issue": "", "subitem_journal_title": "Eleventh International Conference On Computer Applications (ICCA 2013)", "subitem_pages": "", "subitem_volume": ""}]}, "item_1583103147082": {"attribute_name": "Conference papers", "attribute_value_mlt": [{"subitem_acronym": "", "subitem_c_date": "", "subitem_conference_title": "", "subitem_part": "", "subitem_place": "", "subitem_session": "", "subitem_website": ""}]}, "item_1583103211336": {"attribute_name": "Books/reports/chapters", "attribute_value_mlt": [{"subitem_book_title": "", "subitem_isbn": "", "subitem_pages": "", "subitem_place": "", "subitem_publisher": ""}]}, "item_1583103233624": {"attribute_name": "Thesis/dissertations", "attribute_value_mlt": [{"subitem_awarding_university": "", "subitem_supervisor(s)": [{"subitem_supervisor": ""}]}]}, "item_1583105942107": {"attribute_name": "Authors", "attribute_value_mlt": [{"subitem_authors": [{"subitem_authors_fullname": "Win, Ei Khaing"}, {"subitem_authors_fullname": "Thwin, Mie Mie Su"}]}]}, "item_1583108359239": {"attribute_name": "Upload type", "attribute_value_mlt": [{"interim": "Publication"}]}, "item_1583108428133": {"attribute_name": "Publication type", "attribute_value_mlt": [{"interim": "Article"}]}, "item_1583159729339": {"attribute_name": "Publication date", "attribute_value": "2013-02-26"}, "item_1583159847033": {"attribute_name": "Identifier", "attribute_value": "http://onlineresource.ucsy.edu.mm/handle/123456789/860"}, "item_title": "SEC: Security Control System for the Integration of Mobile Agent and Web Services based on Certificateless Cryptography and Two Party Hashing Key Agreement Protocol", "item_type_id": "21", "owner": "1", "path": ["1597824273898"], "permalink_uri": "http://hdl.handle.net/20.500.12678/0000004962", "pubdate": {"attribute_name": "Deposited date", "attribute_value": "2019-07-12"}, "publish_date": "2019-07-12", "publish_status": "0", "recid": "4962", "relation": {}, "relation_version_is_last": true, "title": ["SEC: Security Control System for the Integration of Mobile Agent and Web Services based on Certificateless Cryptography and Two Party Hashing Key Agreement Protocol"], "weko_shared_id": -1}
  1. University of Computer Studies, Yangon
  2. Conferences

SEC: Security Control System for the Integration of Mobile Agent and Web Services based on Certificateless Cryptography and Two Party Hashing Key Agreement Protocol

http://hdl.handle.net/20.500.12678/0000004962
http://hdl.handle.net/20.500.12678/0000004962
873e2c48-a86f-46fb-93ae-13bef25aae89
653cbb9f-9858-402d-8c27-fb1e4da158ca
None
Preview
Name / File License Actions
11096.pdf 11096.pdf (457 Kb)
Publication type
Article
Upload type
Publication
Title
Title SEC: Security Control System for the Integration of Mobile Agent and Web Services based on Certificateless Cryptography and Two Party Hashing Key Agreement Protocol
Language en
Publication date 2013-02-26
Authors
Win, Ei Khaing
Thwin, Mie Mie Su
Description
Security is a major concern for wide applications in large hostile networks like internet. More and More people are willing to access information anytime and anywhere. The advances in mobile devices and wireless networks lead to requirements to tackle the problems like high error rates and frequent disconnections. Currently, the two modern technologies: Mobile Agents and Web Services are used altogether to achieve ubiquitous service access. As a result of applications using combination of mobile agent and web services, security becomes a big concern for applications. The integration of mobile agent and cryptography technologies provide benefits such as improved accessibility wirelessly and increased security. In this paper, SEC (Security Control) System to control the security of the integrated Mobile Agent and Web Services based on certificateless cryptography and (TPHK), two party hashing key agreement protocol, is proposed.
Keywords
mobile agent, web service, certificateless cryptography, key agreement protocol, security control system
Identifier http://onlineresource.ucsy.edu.mm/handle/123456789/860
Journal articles
Eleventh International Conference On Computer Applications (ICCA 2013)
Conference papers
Books/reports/chapters
Thesis/dissertations
Back
0
0
views
downloads
See details
Views Downloads

Versions

Ver.1 2020-09-01 15:34:57.473758
Show All versions

Share

Mendeley Twitter Facebook Print Addthis

Export

OAI-PMH
  • OAI-PMH DublinCore
Other Formats
  • JSON

Confirm


Back to MERAL


Back to MERAL