University of Computer Studies, Hinthada
Menu
  • Home
    • About Us
    • Organization Chart
    • Campus Facilities
      • Laboratories
      • Library
      • Sports
      • Traditional Events
      • Supporting
    • Academic
      • Admission
        • Admission Requirements
        • Academic Calendar
        • Admission Fees
        • Academic Credit Unit
      • courses & Syllabuses
        • 5 years Credit System Curriculum
          • B.C.Sc Courses
          • B.C.Tech Courses
        • 4 Year Credit System Curriculum
          • B.C.Sc Courses
          • B.C.Tech Courses
        • D.C.Sc
      • Academic Calendar
        • 2024-2025
      • Moodle Learning Management System
  • Faculities & Staff
    • Vice Rector
    • Academic
      • Faculty of Computer Science
      • Faculty of Computer Systems and Technologies
      • Faculty of Information Science
      • Faculty of Computing
      • Department of Information Technology Supporting and Maintenance
      • Department of Language
      • Department of Natural Science
    • Administration
      • Department of Student Affairs
      • Department of Staff Affairs
      • Department of Finance
  • University Journal
    • Home
    • Journal Publication
      • 2024
  • Research
    • Pest and Diseases Detection System
  • Library
    • Library Management System
  • News & Activities
    • News
    • Activities
    • Donation
  • Contact
    • Contact us
    • Alumni
    • FAQs
Menu

Prof. Dr. Tun Myat Aung (Тун Мья Аунг)

Vice Rector

University of Computer Studies, Hinthada

Degree : B.Econ.(YUE), M.I.Sc.(UCSY),
               M.Eng&Tech(I.T., MEPhI),
               Ph.D (Tech. Sci., I.T, MEPhI)

Email   : tma@ucsh.edu.mm

1.   Уязвимости программных систем, Научная сессия МИФИ ISBN 5-7262-0555-3, vol. 12, pp. 151-152, Russia, 2005. http://library.mephi.ru/934/935/1194

2.   Генераторы  псевдослучайных  последовательностей  в  задачах защиты инфорхмации, Научная сессия МИФИ ISBN 5-7262-0633-9, vol. 12,pp. 114-115, Russia, 2006. http://library.mephi.ru/934/935/1194

3.     Исследование  стохастических  алгоритмов  обеспечения  безопасности  информации, Научная сессия МИФИ ISBN 5-7262-0633-9, vol. 12,pp. 118-119, Russia, 2006. http://library.mephi.ru/934/935/1194

4.   Генераторы  псевдослучайных  последовательностей,  основанные  на использовании регистров сдвига со стохастическими обратными связями, Научная сессия МИФИ ISBN 5-7262-0710-6, vol. 12, pp.136-137, Russia, 2007. http://library.mephi.ru/934/935/11

5.   Разработка и исследование стохастических алгоритмов защиты инфор- мации , Инженерная Физика  ISSN: 2072-9995, vol. 1,pp.  64-68, Russia, 2007. https://www.elibrary.ru/

6.    Разработка и исследование стохастических методов защиты прогр- аммных систем , Научная электронная библиотека диссертаций и авторефератов, ISBN: 003057994, vol. 1, pp. 1-20, Russia, 2007.https://www.dissercat.com/

7.  Nonlinear Filter Generator over Elliptic Curve , Inscrypt 2008, Proceeding of Symbolic Computation and Cryptolog, Special Track Vol.pp. 30-37, China,2008. http://www.inscrypt.cn

8.  Разработка и исследование стохастических алгоритмов защиты памяти,  REDS: ТЕЛЕКОММУНИКАЦИОННЫЕ УСТРОЙСТВА И СИСТЕМЫ ISSN: 9999-9355, vol. 4, no. 3, pp. 3001- 303, Russia, 2014. https://www.elibrary.ru/

9.   Defensive  Analysis  on  Web-Application  Input  Validation for Advanced Persistent Threat (APT) Attack, Proceeding of  ICCA (UCSY), pp. 79-84, Myanmar, 2016.  https://onlineresource.ucsy.edu.mm

10.  Implementation of Finite Field Arithmetic Operations for Large Prime and Binary Fields Using java BigInteger class, International Journal of Engineering Research and Technology (IJERT) ISSN: 2278-0181, vol. 6, no. 8, pp. 450-453, India, 2017. https://doi.org/10.17577/IJERTV6IS080209

11.  Implementation of Elliptic Curve Arithmetic Operations for Prime Field and Binary Field Using java BigInteger class, International Journal of Engineering Research and Technology (IJERT) ISSN: 2278-0181, vol. 6, no. 8, pp. 454-459, India,2017. https://doi.org/10.17577/IJERTV6IS080211

12.     A  Study  of  General Attacks on Elliptic Curve Discrete Logarithm Problem over Prime Field and Binary Field , International Journal of Information, Control and Computer Sciences ISSN: 2517-9942, vol 11, no. 11, pp. 1153-1160,United Arab Emirates, 2017. https://doi.org/ 10.2139/ssrn.3269714

13.  A Data Confidentiality Approach to SMS on Android , ICO(2018), Advances in Intelligent Systems and Computing, Springer, ISSN: 2194-5357, ISBN:978-3-030-00978-6, vol. 866, pp.505-514, Thai, 2018. https://doi.org/10.1007/978-3-030-00979-3_53

14.  Attack  Experiments  on  Elliptic  Curves  of  Prime and Binary Fields, IEMIS (2018), Advances in Intelligent Systems and Computing,Springer, ISSN: 2194-5357, ISBN:978-981-13-1950-1, vol.755 755, pp.667-683, India,2018. https://doi.org/10.1007/978-981-13-1951-8_60

15.    Experiments  on  Implementation of  Elliptic Curve Arithmetic over Complex Fields Using java BigInteger Class, Journal of Communications, ISSN 1796 - 2021, vol. 14, no. 4, pp. 293-300, United States, 2019. https://doi.org/10.12720/jcm.14.4.293-300

16.  A Complex Transformation of Monoalphabetic Cipher to Polyalphabetic Cipher: (Vigenère - Affine Cipher), International Journal of Machine Learning and Computing, ISSN: 2010-3700, vol. 9, no. 3, pp.296303, Singapore,2019. https://doi.org/10.18178/ijmlc.2019.9.3.801

17.  A Complex Number Approach to Elliptic Curve Crypto- systems over Finite Fields:Implementations and Experiments, IEEE Proceeding of ICCCI 2019, ISBN: 978-1- 5386- 8259-3, ISSN: 2329-7190, pp. 221-228,India,2019. https://doi.org/10.1109/ICCCI.2019.8821887

18.    A  Complex  Polyalphabetic  Cipher Technique: Myanmar Polyalphabetic Cipher, IEEE Proceeding of ICCCI 2019,ISBN: 978-1-5386-8259-3, ISSN: 2329-7190, pp. 229-237,India,2019. https://doi.org/10.1109/ICCCI.2019.8821797

19.  On the study of Quantum Computing, Proceeding of Conference on Science and Tech- nology Development (CSTD- 2019), vol. 2, pp. 46-50, Myanmar, 2019. http://www.cstd.com.mm

20.    SMS  Security  with  RC4  Algorithm  on  Android OS, National  Journal  of Parallel and Soft Computing, Myanmar, 2019.

21.    A New Technique to Improve the Security of Elliptic Curve Encryption and Signature Schemes, FDSE(2019), Lecture Notes in Computer Science,Springer, ISSN:0302-9743, ISBN: 978-3- 030 -35652-1, vol. 11814, pp 371-382, Vietnam, 2019. https://doi.org/10.1007/978-3-030-35653-8_25

22.    Computing and Analysis of Residue Matrices over Complex Plane for Crypto- graphic  Applications, IEEE  Proceeding  of  ICCIT - 1441, ISBN: 978-1-7281-2680-7, pp. 40-44, Saudi Arabia, 2020. https://doi.org/10.1109/iccit-144147971.2020.9213722

23.  Recent  Techniques  Supporting  Vulnerabilities Management for Secure Online Apps, Advances in Cybersecurity Management, Springer, Cham,ISBN:978-3-030-71380-5, pp. 245-267, Editors: Kevin Daimi (UK), Cathryn Peoples (USA), 2021. https://doi.org/10.1007/978-3-030-71381-2_12

24.  Intelligent  Computing  on Complex Plane for Cryptographic Applications, Handbook of Intelligent  Computing  and  Optimization  for  Sustainable Development, WILEY- SCRIVENER PUBLISHING, USA, ISBN: 9781119791829,  pp.69- 79,  Editors: Mukhdeep  Singh  Manshahia (India), Valeriy  Kharchenko  (Russia), Elias Munapo (South Africa), J. Joshua Thomas (Malaysia) and Pandian Vasant (Malaysia), 2022, https://doi.org/10.1002/9781119792642.ch4

25.  Cryptographic and Consensus Techniques Supporting Privacy and Security Management of Cryptocurrency Transactions, Blockchain: Principles and Applications in IoT, CRC Press, Taylor & Francis ,Editors: Dr. Rajdeep Chakraborty(India), Dr. Anupam Ghosh (India), Professor. Valentina Emilia Balas (Romania), Dr. Ahmed A. Elngar (Egypt),2022.https://doi.org/10.1201/9781003203957-14

26.  Recent Techniques for Exploitation and Protection of Common Malicious Inputs to Online Applications, Cyber Security and Digital Forensics: Challenges and Future Trends,Editors: Mangesh M. Ghonge, Sabya- sachi Pramanik, Ramchandra Mangrulkar, Dac-Nhuong Le, 2022. https://doi.org/10.1002/9781119795667.ch15\

27. ဒေါက်တာထွန်းမြတ်အောင်, "ဒီဂျစ်တယ်ကူးပြောင်းမှုမှ နိုင်ငံတော်၏ စီးပွားရေးစဥ်ဆက်မပြတ်ဖွံ့ဖြိုးမှုပန်းတိုင်ဆီသို့", မြန်မာနိုင်ငံ “စီးပွားရေးပညာနှစ်(၁၀၀)” ရာပြည့်အထိမ်းအမှတ်မဂဇင်း (၁၉၂၄-၂၀၂၄), စာမျက်နှာ -၉၀.

Recent News

  • နှစ်သစ်ကူးအလှူဒါနပြုခြင်း
  • မြေငလျင်လှုပ်ခတ်ခဲ့မှုကြောင့် အသက်ဆုံးရှုံးမှုများနှင့် ပျက်စီး ဆုံးရှုံးခဲ့ရမှုများအတွက် ဝမ်းနည်းခြင်းအထိမ်းအမှတ်အဖြစ် တစ်မိနစ် ငြိမ်သက်ခြင်း
  • မြန်မာ့သနပ်ခါးနေ့လှုပ်ရှားမှု အခမ်းအနားကျင်းပခြင်း
  • မီးဘေးနှင့် မီးခိုးအန္တရာယ်အကြောင်း သိကောင်းစရာ‌ဟောပြောခြင်းနှင့် လက်တွေ့သရုပ်ပြပွဲ ကျင်းပခြင်း
  • ၂၀၁၉-၂၀၂၀ ပညာသင်နှစ် ပဥမနှစ် ကျောင်းသား၊ကျောင်းသူ များအား နောက်ဆုံးအကြိမ် ကျောင်းအပ်လက်ခံခြင်း
May 2025
M T W T F S S
« Apr    
 1234
567891011
12131415161718
19202122232425
262728293031  

Contact Us

No.28, Kayin Kyaung Street,  TarNgar Se (South)Quarter, Hinthada Township, Ayeyarwaddy Region, Myanmar. Postcode – 100601

+95  044 22725, 09783543901

cu.hinthada@gmail.com

Like Us On Facebook

Facebook Pagelike Widget
©2025 University of Computer Studies, Hinthada