UCSY's Research Repository

Browsing Fifth Local Conference on Parallel and Soft Computing by Subject "Cryptography"

Browsing Fifth Local Conference on Parallel and Soft Computing by Subject "Cryptography"

Sort by: Order: Results:

  • Nwe, Aye Aye; Win, Myat Su (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Data security system is implemented by using two methods: cryptography and steganography. The effect of these two methods enhances the security of the data and intended to hide and cover the messages within one of the ...
  • Tun, Chaw Nanda; Mya, Khin Than (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Advent technology of security for secret important data and information is called the Cryptography. Cryptography is an important aspect of communications security and is a basic building block for computer security. ...

Search Repository



Browse

My Account