UCSY's Research Repository

Browsing Conferences by Title

Browsing Conferences by Title

Sort by: Order: Results:

  • Win, Ei Khaing; Thwin, Mie Mie Su (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    Security is a major concern for wide applications in large hostile networks like internet. More and More people are willing to access information anytime and anywhere. The advances in mobile devices and wireless networks ...
  • Moe, Hlwan (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Secure exchange of secret messages over public channel plays a very important role of secret communication. The use of Steganography is much less threatening than the use of cryptography because after encoding stego ...
  • Thin, Lwin Mar; Kham, Nang Saing Moon (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    Database security has become a vital issue in modern Web applications. Critical business data in databases is an evident target for attack. Database encryption has become a critical technique in the security mechanisms ...
  • Than, Myo Min (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    In computer and network systems, the private access systems use cryptosystems that provide to certain and ensure data of information that are authentic and secure. This paper will develop the secure bank transaction ...
  • Tun, Thant Zin (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    In virtualization architectures, a small trusted computing base (TCB) minimizes the attacks which could be dangerous the security of the entire system. The TCB for an application includes the hardware, the virtual ...
  • Aung, Theingi Nwe; Hlaing, Ei Ei (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    With the rapid advances in security threads, more reliable security techniques have become the business necessity. The security services must assure that the communication is not refered with in such a way that the party ...
  • Wun, Ei Mon Thu; Phyu, Thandar (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    This paper describes secure transaction of credit card system. The credit card requires the provision of purchaser’s credit card details to the service provider for goods and services purchased over the network. Therefore, ...
  • Hlaing, Pa Pa (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    Data centers have become the nextgeneration computing platforms for enterprises and Internet users. This is primarily due to the economic and technical advantages of resource sharing in data centers. By sharing ...
  • Than, Shwe Sin Myat; Aye, Zin May (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Nowadays, digital communication has become an essential part of infrastructure, a lot of applications are Internet-based and in some cases it is desired that communication be made secret. In a digital world, steganography ...
  • Lai, Hnin Wut Yee; Mya, Khin Than (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Encryption is used to securely transmit data in open network. Each type of data has its own features, therefore different techniques should be used to protect confidential image data from unauthorized access. Most of the ...
  • Mon, Kaung Myat; Khaing, Thiri Thitsar (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    The security of information is the most important factor of information technology and communication. Many different methods have been developed to encrypt and decrypt data in order to keep the message secret. Besides, it ...
  • Thinn, Aye Aye; Thwin, Mie Mie Su (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    Although electronic documents have been greatly widely used in different applications including the e-government and e-business, it would also result that electronic documents information is disclosed, counterfeited, ...
  • Nandar, Saw Mya; Aye, Soe Soe (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Image information is important, especially in the field of military. When those images are transmitted over the communication channel, it needs the privacy. There are a lot of image encryption algorithms. Because of ...
  • Aung, Cho Cho; Mya, Khin Than (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Information security is a major issue today for any company or individual who conducts business electronically. It is of utmost important that mechanisms are set up to ensure information and data security. Cryptography is ...
  • Htet, Lwin; Win, Su Thawda (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Nowadays, Image information is important, especially in the field of military. When those images are transmitted over the communication channel, it needs the privacy. Therefore, Image encryption plays important role. There ...
  • Chit, Aye Myat Myat Mon (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    The development of communication technology, security is a major concern. The widely used image in communication process is vital to protect important image data from unauthorized access. In this paper, the digital ...
  • Htet, Yi Mon; Mya, Khin Than (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Encryption is used to securely transmit data in open networks. It can also be defined as the process of obscuring information to make it unreasonable without special knowledge. Encryption is the process of transformation ...
  • Thin, Lwin Mar; Kham, Nang Saing Moon (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Computer techniques are progressing remarkably and the amount of electronically transmitted information is increasing every day. Different security measures can be employed to ensure the integrity and confidentiality ...
  • Yi, Khone Mar; Zar, Tin Zar (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    The messaging system has become the most popular for mobile communication in the world. This paper is intended to implement secure messaging system for mobile communication. To encrypt / decrypt the message between the ...
  • Myint, May Thu; Renu (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Today, security is an important thing that needs to transport data from location to another safely. Therefore, many models and systems are looking for an ideal method to provide a secure environment for better of the ...

Search Repository



Browse

My Account