
Prof. Dr. Tun Myat Aung (Тун Мья Аунг)
Vice Rector
University of Computer Studies, Hinthada
Degree : B.Econ.(YUE), M.I.Sc.(UCSY),
M.Eng&Tech(I.T., MEPhI),
Ph.D (Tech. Sci., I.T, MEPhI)
Email : tma@ucsh.edu.mm
1.
Уязвимости программных систем, Научная сессия МИФИ ISBN 5-7262-0555-3, vol. 12, pp. 151-152, Russia, 2005. http://library.mephi.ru/934/935/1194
2.
Генераторы псевдослучайных последовательностей в задачах защиты инфорхмации, Научная сессия МИФИ ISBN 5-7262-0633-9, vol. 12,pp. 114-115, Russia, 2006. http://library.mephi.ru/934/935/1194
3.
Исследование стохастических алгоритмов обеспечения безопасности информации, Научная сессия МИФИ ISBN 5-7262-0633-9, vol. 12,pp. 118-119, Russia, 2006. http://library.mephi.ru/934/935/1194
4.
Генераторы псевдослучайных последовательностей, основанные на использовании регистров сдвига со стохастическими обратными связями, Научная сессия МИФИ ISBN 5-7262-0710-6, vol. 12, pp.136-137, Russia, 2007. http://library.mephi.ru/934/935/11
5.
Разработка и исследование стохастических алгоритмов защиты инфор- мации , Инженерная Физика ISSN: 2072-9995, vol. 1,pp. 64-68, Russia, 2007. https://www.elibrary.ru/
6.
Разработка и исследование стохастических методов защиты прогр- аммных систем , Научная электронная библиотека диссертаций и авторефератов, ISBN: 003057994, vol. 1, pp. 1-20, Russia, 2007.https://www.dissercat.com/
7.
Nonlinear Filter Generator over Elliptic Curve , Inscrypt 2008, Proceeding of Symbolic Computation and Cryptolog, Special Track Vol.pp. 30-37, China,2008. http://www.inscrypt.cn
8.
Разработка и исследование стохастических алгоритмов защиты памяти, REDS: ТЕЛЕКОММУНИКАЦИОННЫЕ УСТРОЙСТВА И СИСТЕМЫ ISSN: 9999-9355, vol. 4, no. 3, pp. 3001- 303, Russia, 2014. https://www.elibrary.ru/
9.
Defensive Analysis on Web-Application Input Validation for Advanced Persistent Threat (APT) Attack, Proceeding of ICCA (UCSY), pp. 79-84, Myanmar, 2016. https://onlineresource.ucsy.edu.mm
10.
Implementation of Finite Field Arithmetic Operations for Large Prime and Binary Fields Using java BigInteger class, International Journal of Engineering Research and Technology (IJERT) ISSN: 2278-0181, vol. 6, no. 8, pp. 450-453, India, 2017. https://doi.org/10.17577/IJERTV6IS080209
11.
Implementation of Elliptic Curve Arithmetic Operations for Prime Field and Binary Field Using java BigInteger class, International Journal of Engineering Research and Technology (IJERT) ISSN: 2278-0181, vol. 6, no. 8, pp. 454-459, India,2017. https://doi.org/10.17577/IJERTV6IS080211
12.
A Study of General Attacks on Elliptic Curve Discrete Logarithm Problem over Prime Field and Binary Field , International Journal of Information, Control and Computer Sciences ISSN: 2517-9942, vol 11, no. 11, pp. 1153-1160,United Arab Emirates, 2017. https://doi.org/ 10.2139/ssrn.3269714
13.
A Data Confidentiality Approach to SMS on Android , ICO(2018), Advances in Intelligent Systems and Computing, Springer, ISSN: 2194-5357, ISBN:978-3-030-00978-6, vol. 866, pp.505-514, Thai, 2018. https://doi.org/10.1007/978-3-030-00979-3_53
14.
Attack Experiments on Elliptic Curves of Prime and Binary Fields, IEMIS (2018), Advances in Intelligent Systems and Computing,Springer, ISSN: 2194-5357, ISBN:978-981-13-1950-1, vol.755 755, pp.667-683, India,2018. https://doi.org/10.1007/978-981-13-1951-8_60
15.
Experiments on Implementation of Elliptic Curve Arithmetic over Complex Fields Using java BigInteger Class, Journal of Communications, ISSN 1796 - 2021, vol. 14, no. 4, pp. 293-300, United States, 2019. https://doi.org/10.12720/jcm.14.4.293-300
16.
A Complex Transformation of Monoalphabetic Cipher to Polyalphabetic Cipher: (Vigenère - Affine Cipher), International Journal of Machine Learning and Computing, ISSN: 2010-3700, vol. 9, no. 3, pp.296303, Singapore,2019. https://doi.org/10.18178/ijmlc.2019.9.3.801
17.
A Complex Number Approach to Elliptic Curve Crypto- systems over Finite Fields:Implementations and Experiments, IEEE Proceeding of ICCCI 2019, ISBN: 978-1- 5386- 8259-3, ISSN: 2329-7190, pp. 221-228,India,2019. https://doi.org/10.1109/ICCCI.2019.8821887
18.
A Complex Polyalphabetic Cipher Technique: Myanmar Polyalphabetic Cipher, IEEE Proceeding of ICCCI 2019,ISBN: 978-1-5386-8259-3, ISSN: 2329-7190, pp. 229-237,India,2019. https://doi.org/10.1109/ICCCI.2019.8821797
19.
On the study of Quantum Computing, Proceeding of Conference on Science and Tech- nology Development (CSTD- 2019), vol. 2, pp. 46-50, Myanmar, 2019. http://www.cstd.com.mm
20.
SMS Security with RC4 Algorithm on Android OS, National Journal of Parallel and Soft Computing, Myanmar, 2019.
21.
A New Technique to Improve the Security of Elliptic Curve Encryption and Signature Schemes, FDSE(2019), Lecture Notes in Computer Science,Springer, ISSN:0302-9743, ISBN: 978-3- 030 -35652-1, vol. 11814, pp 371-382, Vietnam, 2019. https://doi.org/10.1007/978-3-030-35653-8_25
22.
Computing and Analysis of Residue Matrices over Complex Plane for Crypto- graphic Applications, IEEE Proceeding of ICCIT - 1441, ISBN: 978-1-7281-2680-7, pp. 40-44, Saudi Arabia, 2020. https://doi.org/10.1109/iccit-144147971.2020.9213722
23.
Recent Techniques Supporting Vulnerabilities Management for Secure Online Apps, Advances in Cybersecurity Management, Springer, Cham,ISBN:978-3-030-71380-5, pp. 245-267, Editors: Kevin Daimi (UK), Cathryn Peoples (USA), 2021. https://doi.org/10.1007/978-3-030-71381-2_12
24.
Intelligent Computing on Complex Plane for Cryptographic Applications, Handbook of Intelligent Computing and Optimization for Sustainable Development, WILEY- SCRIVENER PUBLISHING, USA, ISBN: 9781119791829, pp.69- 79, Editors: Mukhdeep Singh Manshahia (India), Valeriy Kharchenko (Russia), Elias Munapo (South Africa), J. Joshua Thomas (Malaysia) and Pandian Vasant (Malaysia), 2022, https://doi.org/10.1002/9781119792642.ch4
25.
Cryptographic and Consensus Techniques Supporting Privacy and Security Management of Cryptocurrency Transactions, Blockchain: Principles and Applications in IoT, CRC Press, Taylor & Francis ,Editors: Dr. Rajdeep Chakraborty(India), Dr. Anupam Ghosh (India), Professor. Valentina Emilia Balas (Romania), Dr. Ahmed A. Elngar (Egypt),2022.https://doi.org/10.1201/9781003203957-14
26.
Recent Techniques for Exploitation and Protection of Common Malicious Inputs to Online Applications, Cyber Security and Digital Forensics: Challenges and Future Trends,Editors: Mangesh M. Ghonge, Sabya- sachi Pramanik, Ramchandra Mangrulkar, Dac-Nhuong Le, 2022. https://doi.org/10.1002/9781119795667.ch15\
27. ဒေါက်တာထွန်းမြတ်အောင်, "ဒီဂျစ်တယ်ကူးပြောင်းမှုမှ နိုင်ငံတော်၏ စီးပွားရေးစဥ်ဆက်မပြတ်ဖွံ့ဖြိုးမှုပန်းတိုင်ဆီသို့", မြန်မာနိုင်ငံ “စီးပွားရေးပညာနှစ်(၁၀၀)” ရာပြည့်အထိမ်းအမှတ်မဂဇင်း (၁၉၂၄-၂၀၂၄), စာမျက်နှာ -၉၀.