UCSY's Research Repository

Browsing by Subject "security"

Browsing by Subject "security"

Sort by: Order: Results:

  • Han, Sai Saw (Proceedings of the Eighteenth International Conference On Computer Applications (ICCA 2020), 2020-02-28)
    Information and communication technology stands up as an important and effective part of various organization in Myanmar. By use of telecommunication network and internet, the information security and IT risk management ...
  • Ko, Aye Chan; Aung, Nay Aung (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Steganography is the approach for hiding any secret message in a variety of multimedia carriers like text, images, audio or video files. Whenever hiding a secret message, it is very important to make it invisible. This ...
  • Thin, Lwin Mar; Kham, Nang Saing Moon (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    Database security has become a vital issue in modern Web applications. Critical business data in databases is an evident target for attack. Database encryption has become a critical technique in the security mechanisms ...
  • Myint, Kaung Htet; Aung, Tun Myat (National Journal of Parallel and Soft Computing, 2019-03)
    hort Message Service (SMS) is a text messaging service component of mobile communication systems. It uses standardized communications protocols to exchange short text between mobile devices. SMS does not have any built-in ...

Search Repository

Browse

My Account