Log in
Language:

MERAL Myanmar Education Research and Learning Portal

  • Top
  • Universities
  • Ranking
To
lat lon distance
To

Field does not validate



Index Link

Index Tree

Please input email address.

WEKO

One fine body…

WEKO

One fine body…

Item

{"_buckets": {"deposit": "57813030-da7e-4c69-9201-c029bfa87357"}, "_deposit": {"created_by": 92, "id": "7462", "owner": "92", "owners": [92], "owners_ext": {"displayname": "", "username": ""}, "pid": {"revision_id": 0, "type": "depid", "value": "7462"}, "status": "published"}, "_oai": {"id": "oai:meral.edu.mm:recid/00007462", "sets": ["user-miit"]}, "communities": ["miit"], "item_1583103067471": {"attribute_name": "Title", "attribute_value_mlt": [{"subitem_1551255647225": "Identity Based Secure and Confidential Mechanism In Cloud Computing Environment", "subitem_1551255648112": "en"}]}, "item_1583103085720": {"attribute_name": "Description", "attribute_value_mlt": [{"interim": "This paper provide a secure and confidential mechanism by using identity based session key generation and a hybrid cryptographic technique in cloud computing environment. The nature of the system is well suited for distributed nature of cloud servers for an efficient processing with greatly enhanced user\u0027s confidence in cloud computing."}]}, "item_1583103108160": {"attribute_name": "Keywords", "attribute_value_mlt": [{"interim": "Data security"}, {"interim": "Cloud computing"}, {"interim": "Distributed computing"}, {"interim": "Software as a service"}]}, "item_1583103120197": {"attribute_name": "Files", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_access", "date": [{"dateType": "Available", "dateValue": "2021-01-14"}], "displaytype": "preview", "download_preview_message": "", "file_order": 0, "filename": "AICT2013.pdf", "filesize": [{"value": "753 KB"}], "format": "application/pdf", "future_date_message": "", "is_thumbnail": false, "licensetype": "license_0", "mimetype": "application/pdf", "size": 753000.0, "url": {"url": "https://meral.edu.mm/record/7462/files/AICT2013.pdf"}, "version_id": "1c1a4e69-c560-4799-ae59-37c392ac823c"}]}, "item_1583103147082": {"attribute_name": "Conference papers", "attribute_value_mlt": [{"subitem_acronym": "AICT", "subitem_c_date": "2013-Feb-9", "subitem_conference_title": "5th Conference on Applied Information and Communication Technology (AICT-2013)", "subitem_place": "Mandalay", "subitem_session": "Cryptography and Network security"}]}, "item_1583105942107": {"attribute_name": "Authors", "attribute_value_mlt": [{"subitem_authors": [{"subitem_authors_fullname": "Khin Lay Mon"}]}]}, "item_1583108359239": {"attribute_name": "Upload type", "attribute_value_mlt": [{"interim": "Publication"}]}, "item_1583108428133": {"attribute_name": "Publication type", "attribute_value_mlt": [{"interim": "Conference paper"}]}, "item_1583159729339": {"attribute_name": "Publication date", "attribute_value": "2013-02-09"}, "item_title": "Identity Based Secure and Confidential Mechanism In Cloud Computing Environment", "item_type_id": "21", "owner": "92", "path": ["1582963674932", "1597397014014"], "permalink_uri": "http://hdl.handle.net/20.500.12678/0000007462", "pubdate": {"attribute_name": "Deposited date", "attribute_value": "2021-01-14"}, "publish_date": "2021-01-14", "publish_status": "0", "recid": "7462", "relation": {}, "relation_version_is_last": true, "title": ["Identity Based Secure and Confidential Mechanism In Cloud Computing Environment"], "weko_shared_id": -1}
  1. Myanmar Institute of Information Technology
  1. Myanmar Institute of Information Technology
  2. Faculty of Computer System and Technology

Identity Based Secure and Confidential Mechanism In Cloud Computing Environment

http://hdl.handle.net/20.500.12678/0000007462
http://hdl.handle.net/20.500.12678/0000007462
6b40abdb-8f96-4e7f-bda7-680a04b060ad
57813030-da7e-4c69-9201-c029bfa87357
None
Preview
Name / File License Actions
AICT2013.pdf AICT2013.pdf (753 KB)
license.icon
Publication type
Conference paper
Upload type
Publication
Title
Title Identity Based Secure and Confidential Mechanism In Cloud Computing Environment
Language en
Publication date 2013-02-09
Authors
Khin Lay Mon
Description
This paper provide a secure and confidential mechanism by using identity based session key generation and a hybrid cryptographic technique in cloud computing environment. The nature of the system is well suited for distributed nature of cloud servers for an efficient processing with greatly enhanced user's confidence in cloud computing.
Keywords
Data security, Cloud computing, Distributed computing, Software as a service
Conference papers
AICT
2013-Feb-9
5th Conference on Applied Information and Communication Technology (AICT-2013)
Mandalay
Cryptography and Network security
Back
0
0
views
downloads
See details
Views Downloads

Versions

Ver.1 2021-01-14 08:01:58.940218
Show All versions

Share

Mendeley Twitter Facebook Print Addthis

Export

OAI-PMH
  • OAI-PMH DublinCore
Other Formats
  • JSON

Confirm


Back to MERAL


Back to MERAL