UCSY's Research Repository

Browsing Conferences by Title

Browsing Conferences by Title

Sort by: Order: Results:

  • Nyo, Mi Than Than; Aye, Zin May (Eighth Local Conference on Parallel and Soft Computing, 2017-12-27)
    The security of data transmitted over wireless network of passive scanning is of increased interest. Sending data and messages are one of the popular ways of communication.As sending data and messages through mobile ...
  • Win, Kyaw Thura; Nwe, Nwe (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Secure communication in physically vulnerable networks depends upon encryption of material passed between machines. It is feasible for each computer in the network to encrypt and decrypt material efficiently with arbitrary ...
  • Swe, Thin Thin (Sixth Local Conference on Parallel and Soft Computing, 2011-12-29)
    Security requirement is extremely needed to prevent various types of network attacks in some environment such as banking, exam question distribution, and military information exchange process. Files and data are transferred ...
  • Aye, Aye; Kyi, Tin Mar (Twelfth International Conference On Computer Applications (ICCA 2014), 2014-02-17)
    Passwords are essential to ensure the privacy and security of personal data at home, at organization or World Wide Web. Simple passwords can be easily guessed and cracked with attacker’s experience. The better solution ...
  • Thant, Phyo Thandar; Naing, Thinn Thu (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    Today, cloud computing has become important research area and more enterprises are adopting the Cloud based strategy for their businesses. In this case, user access control is the primary concern for cloud users and ...
  • Tun, Chaw Nanda; Mya, Khin Than (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Advent technology of security for secret important data and information is called the Cryptography. Cryptography is an important aspect of communications security and is a basic building block for computer security. ...
  • Htun, Nay Lynn; Mya, Khin Than (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Security is necessary for to protect the information transmission. Cryptography is the process of encryption and decryption a message for data security (such as symmetric and asymmetric cryptography). In this ...
  • Kyaw, San Ohnmar; Zar, Thin Zar (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    File Transfer Protocol (FTP) is the standard mechanism for copying a file from one host to another. Transferring file from one computer to another is one of the most common tasks expected for networking and internetworking ...
  • Nyein, Khin Thara Phyu; Thein, Nilar (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Telegraphy message security system relies on the privacy and authentication of information, which requires implementation of cryptographic functions, and measures are needed to protect data during their transmission. A ...
  • Wai, Hnin Yu; Thein, Yadana (Eighth Local Conference on Parallel and Soft Computing, 2017-12-27)
    Steganography is the method of communicating secrete information hidden in the cover object, that may be text, image, audio, video, and protocol for the purpose of hidden the existence of secret messages. In this ...
  • Tun, Thant Zin (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    Nowadays, virtualization technologies become increasingly popular in enterprise and organizational networks: such as data center. In order to facilitate fault management, highavailability, load balancing and low-level ...
  • Mon, Aye Aye; Mar, Khin Thet (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Today’s connected society requires secure information system to preserve data privacy and authentication in critical applications. This paper intends to implement secure web development system for critical applications. ...
  • Aung, Wai Zin; Mya, Khin Than (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Strong security notions often introduce strong constraints on the construction of cryptographic schemes: semantic security implies probabilistic encryption, while the resistance to existential forgeries requires redundancy ...
  • Phyu, Ei Ei; Moe, Khin Myat Myat (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    The demand of security is getting higher in these days due to easy reproduction of digitally created data. Digitally hide the secret information in some media content like digitized identification card, student’s registration ...
  • Yi, Htay Htay; Aye, Zin May (Sixteenth International Conferences on Computer Applications(ICCA 2018), 2018-02-22)
    In an organization’s of computer network, the intrusion of detection and prevention is the important one because of malicious and dedicated attacks are very high. In this paper, we describe the network infrastructure and ...
  • Latt, Win Zaw; Thwin, Mie Mie Su (ICCA, 2021-02-25)
    Education is an important part of human life and it is also valuable asset for career achievement. Nowadays, people gained certificates from the institution they had learnt and, those graduation documents are presented as ...
  • Mon, Ei Ei; Naing, Thinn Thu (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Cloud is a relatively new concept and so it is unsurprising that the information assurance, data protection, network security and privacy concerns have yet to be fully addressed. The cloud allows users to avoid upfront ...
  • Mon, Ei Ei; Naing, Thinn Thu (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    Cloud is a relatively new concept and so it is unsurprising that the information assurance, data protection, network security and privacy concerns have yet to be fully addressed. Companies such as RedHat, Microsoft, ...
  • Tun, Khin Myaing Myaing; Nyunt, Thi Thi Soe (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Today, security is recognized as an absolute need in application development. The healthcare sector deals with very sensitive data, patient’s medical records need to be kept confidential; hence, security is very important. ...
  • Soe, Naing Thura; Thant, Khin Phyo (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Dijkstra’s Algorithm solves the problem of finding the shortest path from a point (the source) to a destination. This problem is sometimes called the single-source shortest path problem. In these days, the world become ...

Search Repository



Browse

My Account