UCSY's Research Repository

Browsing Fifth Local Conference on Parallel and Soft Computing by Author "Win, Myat Su"

Browsing Fifth Local Conference on Parallel and Soft Computing by Author "Win, Myat Su"

Sort by: Order: Results:

  • Nwe, Aye Aye; Win, Myat Su (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Data security system is implemented by using two methods: cryptography and steganography. The effect of these two methods enhances the security of the data and intended to hide and cover the messages within one of the ...
  • Myat, Nway Htet; Win, Myat Su (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Cryptographic hash functions are a third type of cryptographic algorithm. They take a message of any length as input, and output a short, fixed length hash which can be used in (for example) a digital signature. As digital ...

Search Repository



Browse

My Account