{"created":"2021-01-29T08:27:08.948100+00:00","id":7918,"links":{},"metadata":{"_buckets":{"deposit":"c0e02adf-5684-404b-9166-67bc86b8733e"},"_deposit":{"created_by":73,"id":"7918","owner":"73","owners":[73],"owners_ext":{"displayname":"","email":"thandar_htwe@miit.edu.mm","username":""},"pid":{"revision_id":0,"type":"depid","value":"7918"},"status":"published"},"_oai":{"id":"oai:meral.edu.mm:recid/00007918","sets":["1582963674932","1582963674932:1597396989070"]},"communities":["miit"],"item_1583103067471":{"attribute_name":"Title","attribute_value_mlt":[{"subitem_1551255647225":"SEC Security Control System for the Integration of Mobile Agent and Web Services based on Certificateless Cryptography and Two Party Hashing Key Agreement Protocol","subitem_1551255648112":"en"}]},"item_1583103085720":{"attribute_name":"Description","attribute_value_mlt":[{"interim":"\"Security is a major concern for wide applications in \nlarge hostile networks like internet. More and More \npeople are willing to access information anytime and \nanywhere. The advances in mobile devices and \nwireless networks lead to requirements to tackle the \nproblems like high error rates and frequent \ndisconnections. Currently, the two modern \ntechnologies: Mobile Agents and Web Services are \nused altogether to achieve ubiquitous service access. \nAs a result of applications using combination of \nmobile agent and web services, security becomes a \nbig concern for applications. The integration of \nmobile agent and cryptography technologies provide \nbenefits such as improved accessibility wirelessly and \nincreased security. In this paper, SEC (Security \nControl) System to control the security of the \nintegrated Mobile Agent and Web Services based on \ncertificateless cryptography and (TPHK), two party \nhashing key agreement protocol, is proposed.\n\""}]},"item_1583103108160":{"attribute_name":"Keywords","attribute_value_mlt":[{"interim":"\"mobile agent, web service, certificateless cryptography, key agreement protocol, security control system \""}]},"item_1583103120197":{"attribute_name":"Files","attribute_type":"file","attribute_value_mlt":[{"accessrole":"open_access","date":[{"dateType":"Available","dateValue":"2021-01-29"}],"displaytype":"preview","filename":"SEC Security Control System for the Integration of Mobile Agent and Web Services based on Certificateless Cryptography and Two Party Hashing Key Agreement Protocol.pdf","filesize":[{"value":"874 KB"}],"format":"application/pdf","licensetype":"license_3","url":{"url":"https://meral.edu.mm/record/7918/files/SEC Security Control System for the Integration of Mobile Agent and Web Services based on Certificateless Cryptography and Two Party Hashing Key Agreement Protocol.pdf"},"version_id":"2c8d60db-3f2f-439b-826c-537e99111cf7"}]},"item_1583103147082":{"attribute_name":"Conference papers","attribute_value_mlt":[{"subitem_acronym":"ICCA","subitem_c_date":"Feb. 27, 2013","subitem_conference_title":"ICCA 2013 (International conference on computer application)","subitem_place":"Yangon, Myanmar","subitem_website":"https://www.ucsy.edu.mm/EleventhIccaN.do;jsessionid=12E84508CF2275AC7EF634F28EB59794"}]},"item_1583105942107":{"attribute_name":"Authors","attribute_value_mlt":[{"subitem_authors":[{"subitem_authors_fullname":"Ei Khaing Win"},{"subitem_authors_fullname":"Mie Mie Su Thwin"}]}]},"item_1583108359239":{"attribute_name":"Upload type","attribute_value_mlt":[{"interim":"Publication"}]},"item_1583108428133":{"attribute_name":"Publication type","attribute_value_mlt":[{"interim":"Conference paper"}]},"item_1583159729339":{"attribute_name":"Publication date","attribute_value":"2013-02-20"},"item_title":"SEC Security Control System for the Integration of Mobile Agent and Web Services based on Certificateless Cryptography and Two Party Hashing Key Agreement Protocol","item_type_id":"21","owner":"73","path":["1582963674932","1597396989070"],"publish_date":"2013-02-20","publish_status":"0","recid":"7918","relation_version_is_last":true,"title":["SEC Security Control System for the Integration of Mobile Agent and Web Services based on Certificateless Cryptography and Two Party Hashing Key Agreement Protocol"],"weko_creator_id":"73","weko_shared_id":-1},"updated":"2021-12-13T04:35:04.591405+00:00"}