Browsing by Title

Sort by: Order: Results:

  • Htet, Yi Mon; Mya, Khin Than (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Encryption is used to securely transmit data in open networks. It can also be defined as the process of obscuring information to make it unreasonable without special knowledge. Encryption is the process of transformation ...
  • Thin, Lwin Mar; Kham, Nang Saing Moon (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Computer techniques are progressing remarkably and the amount of electronically transmitted information is increasing every day. Different security measures can be employed to ensure the integrity and confidentiality ...
  • Yi, Khone Mar; Zar, Tin Zar (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    The messaging system has become the most popular for mobile communication in the world. This paper is intended to implement secure messaging system for mobile communication. To encrypt / decrypt the message between the ...
  • Myint, May Thu; Renu (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Today, security is an important thing that needs to transport data from location to another safely. Therefore, many models and systems are looking for an ideal method to provide a secure environment for better of the ...
  • Nyo, Mi Than Than; Aye, Zin May (Eighth Local Conference on Parallel and Soft Computing, 2017-12-27)
    The security of data transmitted over wireless network of passive scanning is of increased interest. Sending data and messages are one of the popular ways of communication.As sending data and messages through mobile ...
  • Win, Kyaw Thura; Nwe, Nwe (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Secure communication in physically vulnerable networks depends upon encryption of material passed between machines. It is feasible for each computer in the network to encrypt and decrypt material efficiently with arbitrary ...
  • Hlaing, Hnin Hsu (University of Computer Studies, Yangon, 2022-06)
    Nowadays, telecommunication technologies are developing rapidly and many organizations are mostly using these technologies. The well known telecommunication technology is the short message service (SMS). It plays a ...
  • Swe, Thin Thin (Sixth Local Conference on Parallel and Soft Computing, 2011-12-29)
    Security requirement is extremely needed to prevent various types of network attacks in some environment such as banking, exam question distribution, and military information exchange process. Files and data are transferred ...
  • Aye, Aye; Kyi, Tin Mar (Twelfth International Conference On Computer Applications (ICCA 2014), 2014-02-17)
    Passwords are essential to ensure the privacy and security of personal data at home, at organization or World Wide Web. Simple passwords can be easily guessed and cracked with attacker’s experience. The better solution ...
  • Thant, Phyo Thandar; Naing, Thinn Thu (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    Today, cloud computing has become important research area and more enterprises are adopting the Cloud based strategy for their businesses. In this case, user access control is the primary concern for cloud users and ...
  • Tun, Chaw Nanda; Mya, Khin Than (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Advent technology of security for secret important data and information is called the Cryptography. Cryptography is an important aspect of communications security and is a basic building block for computer security. ...
  • Htun, Nay Lynn; Mya, Khin Than (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Security is necessary for to protect the information transmission. Cryptography is the process of encryption and decryption a message for data security (such as symmetric and asymmetric cryptography). In this ...
  • Kyaw, San Ohnmar; Zar, Thin Zar (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    File Transfer Protocol (FTP) is the standard mechanism for copying a file from one host to another. Transferring file from one computer to another is one of the most common tasks expected for networking and internetworking ...
  • Nyein, Khin Thara Phyu; Thein, Nilar (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Telegraphy message security system relies on the privacy and authentication of information, which requires implementation of cryptographic functions, and measures are needed to protect data during their transmission. A ...
  • Wai, Hnin Yu; Thein, Yadana (Eighth Local Conference on Parallel and Soft Computing, 2017-12-27)
    Steganography is the method of communicating secrete information hidden in the cover object, that may be text, image, audio, video, and protocol for the purpose of hidden the existence of secret messages. In this ...
  • Tun, Thant Zin (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    Nowadays, virtualization technologies become increasingly popular in enterprise and organizational networks: such as data center. In order to facilitate fault management, highavailability, load balancing and low-level ...
  • Mon, Aye Aye; Mar, Khin Thet (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Today’s connected society requires secure information system to preserve data privacy and authentication in critical applications. This paper intends to implement secure web development system for critical applications. ...
  • Aung, Wai Zin; Mya, Khin Than (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    Strong security notions often introduce strong constraints on the construction of cryptographic schemes: semantic security implies probabilistic encryption, while the resistance to existential forgeries requires redundancy ...
  • Wai, Koung Hsu (University of Computer Studies, Yangon, 2022-06)
    Data security plays an important role in every organization. Therefore, many organizations need to protect their information or data when data in transmission. This system intends to implement the combination of the ...
  • Thu, Chan Myae (University of Computer Studies, Yangon, 2022-09)
    Today people are widely used internet, electronic records because of their ease of alteration and fast transition. The society is becoming more and more digitalized – therefore Information security is becoming more ...

Search Repository

Browse

My Account