UCSY's Research Repository

Browsing International Conference on Computer Applications (ICCA) by Author "Aung, Nay Aung"

Browsing International Conference on Computer Applications (ICCA) by Author "Aung, Nay Aung"

Sort by: Order: Results:

  • Aung, Nay Aung; Min, Myat Myat (Thirteenth International Conferences on Computer Applications(ICCA 2015), 2015-02-05)
    There are various types of cloud services with each type having a potentially different use in criminal activity. The storage as a service (StaaS) is showing significant growth as users adopt the capability to store data ...
  • Aung, Nay Aung; Ko, Aye Chan (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Nowadays, steganography plays a critical role in Information Security. A number of steganographic algorithms have been proposed by focusing on this property of a steganographic system. It is needed two bytes to hide ...
  • Aung, Nay Aung; Min, Myat Myat (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    Cloud storage forensics has recently emerged as a salient area of inquiry. One area of difficulty is the identification and acquisition of potential data when disparate services can be utilized by criminals. There is ...
  • Ko, Aye Chan; Aung, Nay Aung (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Steganography is the approach for hiding any secret message in a variety of multimedia carriers like text, images, audio or video files. Whenever hiding a secret message, it is very important to make it invisible. This ...

Search Repository



Browse

My Account