UCSY's Research Repository

Browsing International Conference on Computer Applications (ICCA) by Subject "security"

Browsing International Conference on Computer Applications (ICCA) by Subject "security"

Sort by: Order: Results:

  • Han, Sai Saw (Proceedings of the Eighteenth International Conference On Computer Applications (ICCA 2020), 2020-02-28)
    Information and communication technology stands up as an important and effective part of various organization in Myanmar. By use of telecommunication network and internet, the information security and IT risk management ...
  • Ko, Aye Chan; Aung, Nay Aung (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Steganography is the approach for hiding any secret message in a variety of multimedia carriers like text, images, audio or video files. Whenever hiding a secret message, it is very important to make it invisible. This ...
  • Thin, Lwin Mar; Kham, Nang Saing Moon (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    Database security has become a vital issue in modern Web applications. Critical business data in databases is an evident target for attack. Database encryption has become a critical technique in the security mechanisms ...

Search Repository



Browse

My Account