Browsing by Title

Sort by: Order: Results:

  • Mon, Kaung Myat; Khaing, Thiri Thitsar (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    The security of information is the most important factor of information technology and communication. Many different methods have been developed to encrypt and decrypt data in order to keep the message secret. Besides, it ...
  • Thinn, Aye Aye; Thwin, Mie Mie Su (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    Although electronic documents have been greatly widely used in different applications including the e-government and e-business, it would also result that electronic documents information is disclosed, counterfeited, ...
  • Nandar, Saw Mya; Aye, Soe Soe (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Image information is important, especially in the field of military. When those images are transmitted over the communication channel, it needs the privacy. There are a lot of image encryption algorithms. Because of ...
  • Aung, Cho Cho; Mya, Khin Than (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Information security is a major issue today for any company or individual who conducts business electronically. It is of utmost important that mechanisms are set up to ensure information and data security. Cryptography is ...
  • Htet, Lwin; Win, Su Thawda (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Nowadays, Image information is important, especially in the field of military. When those images are transmitted over the communication channel, it needs the privacy. Therefore, Image encryption plays important role. There ...
  • Chit, Aye Myat Myat Mon (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    The development of communication technology, security is a major concern. The widely used image in communication process is vital to protect important image data from unauthorized access. In this paper, the digital ...
  • Htet, Yi Mon; Mya, Khin Than (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Encryption is used to securely transmit data in open networks. It can also be defined as the process of obscuring information to make it unreasonable without special knowledge. Encryption is the process of transformation ...
  • Thin, Lwin Mar; Kham, Nang Saing Moon (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Computer techniques are progressing remarkably and the amount of electronically transmitted information is increasing every day. Different security measures can be employed to ensure the integrity and confidentiality ...
  • Yi, Khone Mar; Zar, Tin Zar (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    The messaging system has become the most popular for mobile communication in the world. This paper is intended to implement secure messaging system for mobile communication. To encrypt / decrypt the message between the ...
  • Myint, May Thu; Renu (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Today, security is an important thing that needs to transport data from location to another safely. Therefore, many models and systems are looking for an ideal method to provide a secure environment for better of the ...
  • Nyo, Mi Than Than; Aye, Zin May (Eighth Local Conference on Parallel and Soft Computing, 2017-12-27)
    The security of data transmitted over wireless network of passive scanning is of increased interest. Sending data and messages are one of the popular ways of communication.As sending data and messages through mobile ...
  • Win, Kyaw Thura; Nwe, Nwe (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Secure communication in physically vulnerable networks depends upon encryption of material passed between machines. It is feasible for each computer in the network to encrypt and decrypt material efficiently with arbitrary ...
  • Hlaing, Hnin Hsu (University of Computer Studies, Yangon, 2022-06)
    Nowadays, telecommunication technologies are developing rapidly and many organizations are mostly using these technologies. The well known telecommunication technology is the short message service (SMS). It plays a ...
  • Swe, Thin Thin (Sixth Local Conference on Parallel and Soft Computing, 2011-12-29)
    Security requirement is extremely needed to prevent various types of network attacks in some environment such as banking, exam question distribution, and military information exchange process. Files and data are transferred ...
  • Aye, Aye; Kyi, Tin Mar (Twelfth International Conference On Computer Applications (ICCA 2014), 2014-02-17)
    Passwords are essential to ensure the privacy and security of personal data at home, at organization or World Wide Web. Simple passwords can be easily guessed and cracked with attacker’s experience. The better solution ...
  • Thant, Phyo Thandar; Naing, Thinn Thu (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    Today, cloud computing has become important research area and more enterprises are adopting the Cloud based strategy for their businesses. In this case, user access control is the primary concern for cloud users and ...
  • Tun, Chaw Nanda; Mya, Khin Than (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Advent technology of security for secret important data and information is called the Cryptography. Cryptography is an important aspect of communications security and is a basic building block for computer security. ...
  • Htun, Nay Lynn; Mya, Khin Than (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Security is necessary for to protect the information transmission. Cryptography is the process of encryption and decryption a message for data security (such as symmetric and asymmetric cryptography). In this ...
  • Kyaw, San Ohnmar; Zar, Thin Zar (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    File Transfer Protocol (FTP) is the standard mechanism for copying a file from one host to another. Transferring file from one computer to another is one of the most common tasks expected for networking and internetworking ...
  • Nyein, Khin Thara Phyu; Thein, Nilar (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Telegraphy message security system relies on the privacy and authentication of information, which requires implementation of cryptographic functions, and measures are needed to protect data during their transmission. A ...

Search Repository

Browse

My Account