Conferences: Recent submissions

  • Aung, Yin Pa Pa; Htoo, Nay Zar Chi (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Cryptography makes secure websites and electronic safe transmission possible. For a web site to be secure all of the data transmitted between the computers where the data is kept and where it is received must be encrypted. ...
  • Aye, Htein Linn; Htwe, Tin Myat (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Nowadays, online processing is increasing day by day and security plays important role in online processing , especially in the area of government processes. There are several security algorithms already presented. Among ...
  • Kyi, Linn Htaik; Mya, Khin Than (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    In the rapid improvement of communication environment, it is desirable to improve the security measure on the use of between the sender and receiver. Cryptography is an important aspect of communications security and ...
  • Thein, Si Thu Min; Mya, Khin Than (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Computer security is very important role for information and data. Data communication is the most important in the world. Communication technology is increased as well as an authorized person can intercept the security ...
  • Mon, Aye Myat; Mya, Khin Than (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Medical record security is essential when storing and sending over any untrusted medium and information system. Any hospitals need secured medical records of their patients in order to provide more efficient and through ...
  • Ko, Naing Linn Ko; Mya, Khin Than (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    The growth of the Internet and e-commerce has presented businesses; these have also been exposed to the various threats. So, network security is necessary to counter the threats and make networks safe to use. The main ...
  • Thura, Phyo (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Two secure end users want to communicate over an insecure channel. The enemy user is an outsider, listening to attack the communication. Encryption is the converting readable information as “plain text” into ...
  • Aung, Htin Lin; Zaw, Win (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Nowadays, Internet and network applications are growing very fast, so critical information is needed to protect . Crypto algorithms play a main role in information security systems. In this paper, we present secure data ...
  • Hein, Kyaw Mg Mg; Mya, Khin Than (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Cryptographic algorithm could be used to protect sensitive and valuable data during transmission and in storage. Encryption had been largely the concern of military and intelligence organizations. Among them, Myanmar ...
  • Aye, Aye (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Computer security is an important field of study for most day-to-day transactions. Cryptography standards are needed to create interoperability in the transformation security world. Cryptography mechanism is based on ...
  • Tun, Thurein; Ni, Nwe (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    The propose system intends to implement the Email security system using RC5, BBS and RSA algorithms to encrypt and decrypt of messages. It also intends to analysis the symmetric key algorithm , public key algorithm , ...
  • Oo, Wint War; Aye, Hnin Hnin (Third Local Conference on Parallel and Soft Computing, 2009-07-03)
    This paper presents our work on an implementation for data sharing system by using AES ( Advanced Encryption Standard) algorithm, which is applicable in security field for providing data confidentiality. In this paper, AES ...
  • Yar, Htun Min; Mya, Khin Than (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Images are routinely used in diverse areas such as medical, military, science, engineering, art, entertainment, advertising, education as well as training. With the increasing use of digital techniques for transmitting ...
  • Maung, Kyi Phyu Myint; Mya, Khin Than (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Due to the increasing use of images in industrial process, it is essential to protect the confidential image data from unauthorized access. Image encryption plays a significant role in the field of information hiding. ...
  • Kyaw, Phyo Wai; Kham, Nang Saing Moon (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    E-mail is widely used all over the world in various fields such as economic, office, personal case and so on. It is easy to transport data from place to place in a short time. E-mail has become one of the most important ...
  • Linn, Naing; Khine, May Aye (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Security aspects come into play when it is necessary or describe to protect the information transmission. The goal of cryptography is to make it possible for two people to exchange a message in such a way that other ...
  • Kyaw, Wai Phyo; Zaw, Win Win (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    In distributed Authentication between clients and servers using public key cryptography approach, both client and server do not need to maintain keys with Key Distribution Center (KDC). Maintaining keys at the server ...
  • Win, May Thu; Myaing, Khin Lay (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Nowadays, the security of the information exchanged is very important. In this paper, MD5 is used for computing the hash value of the message and RSA is used for signing the message and verifying the digital signature. ...
  • Zodingliana (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Cryptograph is crucial to communicating medium. The use of cryptography today becomes widespread, not just in military situation but for commercial and private purposes. So the electronic messages and documents which ...
  • Han, Hane Thu; Win, Su Thawda (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    The role of cryptograph is important for data security. Many cryptographic techniques can be used to keep security of sensitive data. Information is an arm of Military as well as the security of information is it’s life. ...

Search Repository



Browse

My Account