UCSY's Research Repository

Browsing International Conference on Computer Applications (ICCA) by Author "Soe, Than Naing"

Browsing International Conference on Computer Applications (ICCA) by Author "Soe, Than Naing"

Sort by: Order: Results:

  • Aye, Aye; Soe, Than Naing (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    In today's world of distributed environment, password authentication is very important to protect customer's sensitive data over Internet. The mainly two types of password are static password and dynamic password. Static ...
  • Aye, The` Seint; Soe, Than Naing (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    In the study of Cryptography, the most important and widely studied are confidentiality and integrity. Confidentiality is supported by encryption schemes, while integrity is provided by digital signature schemes. Drawback ...
  • Aye, The' Seint; Soe, Than Naing (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    In the study of Cryptography, the most important and widely studied are confidentiality and integrity. Confidentiality is supported by encryption schemes, while integrity is provided by digital signature schemes. Drawback ...
  • Myat, Soe Myint; Soe, Than Naing (Proceedings of the Eighteenth International Conference On Computer Applications (ICCA 2020), 2020-02-28)
    An effective IT solution is required for the administrative processes which is the core of university. The tamper resistance, transparency and auditability for university management data are very important to avoid the ...
  • Zin, Wai Wai; Soe, Than Naing (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    The network security is very important for data transmission on the internet and security threat is very important challenges in any communication system. This security of information can be achieved by using encryption and ...
  • Aye, Myat Mon; Soe, Than Naing (Eleventh International Conference On Computer Applications (ICCA 2013), 2013-02-26)
    The amount of valuable information, which is stored and shared digitally on online and cloud computing, is dynamically increasing. So, the storage and sharing service providers must have the ability to identify the ownership ...

Search Repository



Browse

My Account