Log in
Language:

MERAL Myanmar Education Research and Learning Portal

  • MERAL
  • Universities
  • Ranking
AND
To


Index Link

Index Tree

WEKO

One fine body…

Item

{"_buckets": {"deposit": "4ad70c00-48a8-43fc-b398-181c3f00e4c4"}, "_deposit": {"id": "5044", "owners": [], "pid": {"revision_id": 0, "type": "recid", "value": "5044"}, "status": "published"}, "_oai": {"id": "oai:meral.edu.mm:recid/5044"}, "item_1583103067471": {"attribute_name": "Title", "attribute_value_mlt": [{"subitem_1551255647225": "Implementation of Secure Message Transfer System Using Controlled Trusted Center Based on RSA", "subitem_1551255648112": "en"}]}, "item_1583103085720": {"attribute_name": "Description", "attribute_value_mlt": [{"interim": "This paper presents data transfer systembetween two users using the asymmetric-keycryptography. Asymmetric-key cryptography orpublic-key cryptography is cryptography in whicha pair of keys is used to encrypt and decrypt amessage so that it arrives securely. A message canbe encrypted with the receiver\u2019s public key anddecrypted with the receiver\u2019s private key toprovide security. A higher level of security can beachieved by placing controlled trusted center as adirectory of public keys. Controlled TrustedCenter keeps the public key of the registered usersin its directoryand responsible to respond to anyinquiry about the public key. The public-keyannouncements can include a timestamp and besigned by an authority to prevent interception andmodification of the response. A signature is atechnique for non-repudiation based on the publickey cryptography. RSA digital signature and SHA-1 hash function are applied to provide integrityand authentication during the public keydistribution. RSA encryption algorithm is alsoused for encryption in this secure messagetransfer system. RSA is two algorithms: one forasymmetric encryption and one for signatures."}]}, "item_1583103108160": {"attribute_name": "Keywords", "attribute_name_i18n": "Keywords", "attribute_value": []}, "item_1583103120197": {"attribute_name": "Files", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_access", "date": [{"dateType": "Available", "dateValue": "2019-07-18"}], "displaytype": "preview", "download_preview_message": "", "filename": "38_PDFsam_PSC_final proof.pdf", "filesize": [{"value": "110 Kb"}], "format": "application/pdf", "future_date_message": "", "is_thumbnail": false, "licensetype": "license_free", "mimetype": "application/pdf", "size": 110000, "url": {"url": "https://meral.edu.mm/record/5044/files/38_PDFsam_PSC_final proof.pdf"}, "version_id": "8f13825b-4c16-4440-93e0-b642ace772d2"}]}, "item_1583103131163": {"attribute_name": "Journal articles", "attribute_value_mlt": [{"subitem_issue": "", "subitem_journal_title": "Eighth Local Conference on Parallel and Soft Computing", "subitem_pages": "", "subitem_volume": ""}]}, "item_1583103147082": {"attribute_name": "Conference papers", "attribute_value_mlt": [{"subitem_acronym": "", "subitem_c_date": "", "subitem_conference_title": "", "subitem_part": "", "subitem_place": "", "subitem_session": "", "subitem_website": ""}]}, "item_1583103211336": {"attribute_name": "Books/reports/chapters", "attribute_value_mlt": [{"subitem_book_title": "", "subitem_isbn": "", "subitem_pages": "", "subitem_place": "", "subitem_publisher": ""}]}, "item_1583103233624": {"attribute_name": "Thesis/dissertations", "attribute_value_mlt": [{"subitem_awarding_university": "", "subitem_supervisor(s)": [{"subitem_supervisor": ""}]}]}, "item_1583105942107": {"attribute_name": "Authors", "attribute_value_mlt": [{"subitem_authors": [{"subitem_authors_fullname": "Wai, Ei Chu"}, {"subitem_authors_fullname": "Wai, Khaing Khaing"}]}]}, "item_1583108359239": {"attribute_name": "Upload type", "attribute_name_i18n": "Upload type", "attribute_value": "Publication"}, "item_1583108428133": {"attribute_name": "Publication type", "attribute_name_i18n": "Publication type", "attribute_value": "Article"}, "item_1583159729339": {"attribute_name": "Publication date", "attribute_name_i18n": "Publication date", "attribute_value": "2017-12-27"}, "item_1583159847033": {"attribute_name": "Identifier", "attribute_value": "http://onlineresource.ucsy.edu.mm/handle/123456789/938"}, "item_title": "Implementation of Secure Message Transfer System Using Controlled Trusted Center Based on RSA", "item_type_id": "21", "owner": "1", "path": ["1582963302567/1597824273898"], "permalink_uri": "http://hdl.handle.net/20.500.12678/0000005044", "pubdate": {"attribute_name": "Deposited date", "attribute_value": "2019-07-18"}, "publish_date": "2019-07-18", "publish_status": "0", "recid": "5044", "relation": {}, "relation_version_is_last": true, "title": ["Implementation of Secure Message Transfer System Using Controlled Trusted Center Based on RSA"], "weko_shared_id": -1}
  1. University of Computer Studies, Yangon
  2. Conferences

Implementation of Secure Message Transfer System Using Controlled Trusted Center Based on RSA

http://hdl.handle.net/20.500.12678/0000005044
20e30f53-7cbf-44a8-a0a3-18c475178ff1
4ad70c00-48a8-43fc-b398-181c3f00e4c4
Preview
Name / File License Actions
38_PDFsam_PSC_final 38_PDFsam_PSC_final proof.pdf (110 Kb)
Publication type Article
Upload type Publication
Title
Implementation of Secure Message Transfer System Using Controlled Trusted Center Based on RSA
en
Publication date 2017-12-27
Authors
Wai, Ei Chu
Wai, Khaing Khaing
Description
This paper presents data transfer systembetween two users using the asymmetric-keycryptography. Asymmetric-key cryptography orpublic-key cryptography is cryptography in whicha pair of keys is used to encrypt and decrypt amessage so that it arrives securely. A message canbe encrypted with the receiver’s public key anddecrypted with the receiver’s private key toprovide security. A higher level of security can beachieved by placing controlled trusted center as adirectory of public keys. Controlled TrustedCenter keeps the public key of the registered usersin its directoryand responsible to respond to anyinquiry about the public key. The public-keyannouncements can include a timestamp and besigned by an authority to prevent interception andmodification of the response. A signature is atechnique for non-repudiation based on the publickey cryptography. RSA digital signature and SHA-1 hash function are applied to provide integrityand authentication during the public keydistribution. RSA encryption algorithm is alsoused for encryption in this secure messagetransfer system. RSA is two algorithms: one forasymmetric encryption and one for signatures.
Journal articles
Eighth Local Conference on Parallel and Soft Computing
Conference papers
Books/reports/chapters
Thesis/dissertations
Back
0
0
views
downloads
See details
Views Downloads

Versions

Ver.1 2020-09-01 15:40:30.225507
Show All versions

Share

Mendeley CiteULike Twitter Facebook Print Addthis

Export

OAI-PMH
  • OAI-PMH DublinCore
Other Formats
  • JSON

Confirm


Back to MERAL


Back to MERAL