MERAL Myanmar Education Research and Learning Portal
Item
{"_buckets": {"deposit": "292ed05b-3488-472a-bc6d-bdc72ca935c9"}, "_deposit": {"created_by": 92, "id": "7441", "owner": "92", "owners": [92], "owners_ext": {"displayname": "", "username": ""}, "pid": {"revision_id": 0, "type": "depid", "value": "7441"}, "status": "published"}, "_oai": {"id": "oai:meral.edu.mm:recid/00007441", "sets": ["user-miit"]}, "communities": ["miit"], "control_number": "7441", "item_1583103067471": {"attribute_name": "Title", "attribute_value_mlt": [{"subitem_1551255647225": "Secure E-mail System Using Hybrid Approach of Triple DES and RSA Encryption Algorithms", "subitem_1551255648112": "en"}]}, "item_1583103085720": {"attribute_name": "Description", "attribute_value_mlt": [{"interim": "This system implements two encryption and two decryption as hybrid approach by using the combination of a symmetric encryption\nalgorithm, Triple-DES and an asymmetric encryption algorithm, RSA encryption algorithm. One of the two components is key encryption with\nRSA public key algorithm and another is data encryption by using the Triple-DES encryption algorithm."}]}, "item_1583103120197": {"attribute_name": "Files", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_access", "date": [{"dateType": "Available", "dateValue": "2021-01-14"}], "displaytype": "preview", "download_preview_message": "", "file_order": 0, "filename": "AICT2009doc.pdf", "filesize": [{"value": "323 KB"}], "format": "application/pdf", "future_date_message": "", "is_thumbnail": false, "licensetype": "license_0", "mimetype": "application/pdf", "size": 323000.0, "url": {"url": "https://meral.edu.mm/record/7441/files/AICT2009doc.pdf"}, "version_id": "784a8e05-657d-4ba4-be35-e0c58df27512"}]}, "item_1583103147082": {"attribute_name": "Conference papers", "attribute_value_mlt": [{"subitem_acronym": "AICT", "subitem_c_date": "2009- Sept", "subitem_conference_title": "2nd Conference on Applied Information and Communication Technology (AICT-2009)", "subitem_place": "Mandalay", "subitem_session": "Cryptography, Network security and Network Technology"}]}, "item_1583105942107": {"attribute_name": "Authors", "attribute_value_mlt": [{"subitem_authors": [{"subitem_authors_fullname": "Khin Lay Mon"}, {"subitem_authors_fullname": "Thiri Naing"}]}]}, "item_1583108359239": {"attribute_name": "Upload type", "attribute_value_mlt": [{"interim": "Publication"}]}, "item_1583108428133": {"attribute_name": "Publication type", "attribute_value_mlt": [{"interim": "Conference paper"}]}, "item_1583159729339": {"attribute_name": "Publication date", "attribute_value": "2009-09-15"}, "item_title": "Secure E-mail System Using Hybrid Approach of Triple DES and RSA Encryption Algorithms", "item_type_id": "21", "owner": "92", "path": ["1582963674932", "1597397014014"], "permalink_uri": "http://hdl.handle.net/20.500.12678/0000007441", "pubdate": {"attribute_name": "Deposited date", "attribute_value": "2021-01-14"}, "publish_date": "2021-01-14", "publish_status": "0", "recid": "7441", "relation": {}, "relation_version_is_last": true, "title": ["Secure E-mail System Using Hybrid Approach of Triple DES and RSA Encryption Algorithms"], "weko_shared_id": -1}
Secure E-mail System Using Hybrid Approach of Triple DES and RSA Encryption Algorithms
http://hdl.handle.net/20.500.12678/0000007441
http://hdl.handle.net/20.500.12678/0000007441d11980aa-42af-4e36-b7ed-2829c27a6f0a
292ed05b-3488-472a-bc6d-bdc72ca935c9
Name / File | License | Actions |
---|---|---|
AICT2009doc.pdf (323 KB)
|
Publication type | ||||||
---|---|---|---|---|---|---|
Conference paper | ||||||
Upload type | ||||||
Publication | ||||||
Title | ||||||
Title | Secure E-mail System Using Hybrid Approach of Triple DES and RSA Encryption Algorithms | |||||
Language | en | |||||
Publication date | 2009-09-15 | |||||
Authors | ||||||
Khin Lay Mon | ||||||
Thiri Naing | ||||||
Description | ||||||
This system implements two encryption and two decryption as hybrid approach by using the combination of a symmetric encryption algorithm, Triple-DES and an asymmetric encryption algorithm, RSA encryption algorithm. One of the two components is key encryption with RSA public key algorithm and another is data encryption by using the Triple-DES encryption algorithm. |
||||||
Conference papers | ||||||
AICT | ||||||
2009- Sept | ||||||
2nd Conference on Applied Information and Communication Technology (AICT-2009) | ||||||
Mandalay | ||||||
Cryptography, Network security and Network Technology |