Log in
Language:

MERAL Myanmar Education Research and Learning Portal

  • MERAL
  • Universities
  • Ranking
AND
To


Index Link

Index Tree

WEKO

One fine body…

Item

{"_buckets": {"deposit": "99bdf764-98f4-4645-a427-5c69442fa228"}, "_deposit": {"id": "4981", "owners": [], "pid": {"revision_id": 0, "type": "recid", "value": "4981"}, "status": "published"}, "_oai": {"id": "oai:meral.edu.mm:recid/4981"}, "item_1583103067471": {"attribute_name": "Title", "attribute_value_mlt": [{"subitem_1551255647225": "Authentication System for Online Examination Using Keyed-Hash Message Authentication Code and Multi-agent System", "subitem_1551255648112": "en"}]}, "item_1583103085720": {"attribute_name": "Description", "attribute_value_mlt": [{"interim": "Agents are independent pieces of software capable ofacting autonomously in response to input from theirenvironment. A multi-agent system is a systemcomposed of numerous agents. Besides, it can be usedto solve problems which are difficult for an individualagent to solve. With the growth of Internet anddistributed computing, more and more web applicationsemployed agent based applications. Security is animportant issue for the widespread development ofapplication based on software agent. When users weresimply accessing information on a network, simplepasswords were usually sufficient to protectinformation. However, the increasingly distributedcomputing environment are often operated by multipleparties and password-cracking programs are availablethat can break typical passwords in a short period oftime. Consequently, the need for stronger levels ofauthentication has become critical. This paperdescribes agents that used Keyed-Hash MessageAuthentication Code (HMAC) to authenticate valid userto ensure proper access and control of the web basedonline examination agent."}]}, "item_1583103108160": {"attribute_name": "Keywords", "attribute_name_i18n": "Keywords", "attribute_value": []}, "item_1583103120197": {"attribute_name": "Files", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_access", "date": [{"dateType": "Available", "dateValue": "2019-07-12"}], "displaytype": "preview", "download_preview_message": "", "filename": "psc2010paper (147).pdf", "filesize": [{"value": "282 Kb"}], "format": "application/pdf", "future_date_message": "", "is_thumbnail": false, "licensetype": "license_free", "mimetype": "application/pdf", "size": 282000, "url": {"url": "https://meral.edu.mm/record/4981/files/psc2010paper (147).pdf"}, "version_id": "770fcfbd-b0c5-43f4-8874-92a3d910b43c"}]}, "item_1583103131163": {"attribute_name": "Journal articles", "attribute_value_mlt": [{"subitem_issue": "", "subitem_journal_title": "Fifth Local Conference on Parallel and Soft Computing", "subitem_pages": "", "subitem_volume": ""}]}, "item_1583103147082": {"attribute_name": "Conference papers", "attribute_value_mlt": [{"subitem_acronym": "", "subitem_c_date": "", "subitem_conference_title": "", "subitem_part": "", "subitem_place": "", "subitem_session": "", "subitem_website": ""}]}, "item_1583103211336": {"attribute_name": "Books/reports/chapters", "attribute_value_mlt": [{"subitem_book_title": "", "subitem_isbn": "", "subitem_pages": "", "subitem_place": "", "subitem_publisher": ""}]}, "item_1583103233624": {"attribute_name": "Thesis/dissertations", "attribute_value_mlt": [{"subitem_awarding_university": "", "subitem_supervisor(s)": [{"subitem_supervisor": ""}]}]}, "item_1583105942107": {"attribute_name": "Authors", "attribute_value_mlt": [{"subitem_authors": [{"subitem_authors_fullname": "Tint, Yin Lai Winn"}, {"subitem_authors_fullname": "Hlaing, Swe Zin"}]}]}, "item_1583108359239": {"attribute_name": "Upload type", "attribute_name_i18n": "Upload type", "attribute_value": "Publication"}, "item_1583108428133": {"attribute_name": "Publication type", "attribute_name_i18n": "Publication type", "attribute_value": "Article"}, "item_1583159729339": {"attribute_name": "Publication date", "attribute_name_i18n": "Publication date", "attribute_value": "2010-12-16"}, "item_1583159847033": {"attribute_name": "Identifier", "attribute_value": "http://onlineresource.ucsy.edu.mm/handle/123456789/879"}, "item_title": "Authentication System for Online Examination Using Keyed-Hash Message Authentication Code and Multi-agent System", "item_type_id": "21", "owner": "1", "path": ["1582963302567/1597824273898"], "permalink_uri": "http://hdl.handle.net/20.500.12678/0000004981", "pubdate": {"attribute_name": "Deposited date", "attribute_value": "2019-07-12"}, "publish_date": "2019-07-12", "publish_status": "0", "recid": "4981", "relation": {}, "relation_version_is_last": true, "title": ["Authentication System for Online Examination Using Keyed-Hash Message Authentication Code and Multi-agent System"], "weko_shared_id": -1}
  1. University of Computer Studies, Yangon
  2. Conferences

Authentication System for Online Examination Using Keyed-Hash Message Authentication Code and Multi-agent System

http://hdl.handle.net/20.500.12678/0000004981
17be467c-df9b-4a59-9b93-371c9bdfc7bf
99bdf764-98f4-4645-a427-5c69442fa228
Preview
Name / File License Actions
psc2010paper psc2010paper (147).pdf (282 Kb)
Publication type Article
Upload type Publication
Title
Authentication System for Online Examination Using Keyed-Hash Message Authentication Code and Multi-agent System
en
Publication date 2010-12-16
Authors
Tint, Yin Lai Winn
Hlaing, Swe Zin
Description
Agents are independent pieces of software capable ofacting autonomously in response to input from theirenvironment. A multi-agent system is a systemcomposed of numerous agents. Besides, it can be usedto solve problems which are difficult for an individualagent to solve. With the growth of Internet anddistributed computing, more and more web applicationsemployed agent based applications. Security is animportant issue for the widespread development ofapplication based on software agent. When users weresimply accessing information on a network, simplepasswords were usually sufficient to protectinformation. However, the increasingly distributedcomputing environment are often operated by multipleparties and password-cracking programs are availablethat can break typical passwords in a short period oftime. Consequently, the need for stronger levels ofauthentication has become critical. This paperdescribes agents that used Keyed-Hash MessageAuthentication Code (HMAC) to authenticate valid userto ensure proper access and control of the web basedonline examination agent.
Journal articles
Fifth Local Conference on Parallel and Soft Computing
Conference papers
Books/reports/chapters
Thesis/dissertations
Back
0
0
views
downloads
See details
Views Downloads

Versions

Ver.1 2020-09-01 15:36:22.097157
Show All versions

Share

Mendeley CiteULike Twitter Facebook Print Addthis

Export

OAI-PMH
  • OAI-PMH DublinCore
Other Formats
  • JSON

Confirm


Back to MERAL


Back to MERAL