Search

Your search keyword '"Caesar cipher"' showing total 217 results

Search Constraints

Start Over You searched for: Descriptor "Caesar cipher" Remove constraint Descriptor: "Caesar cipher"
217 results on '"Caesar cipher"'

Search Results

51. Secure and efficient transmission of data based on Caesar Cipher Algorithm for Sybil attack in IoT

52. PENGAMANAN DATA TEKS MELALUI PERPADUAN ALGORITMA BEAUFORT DAN CAESAR CIPHER

53. A Novel Approach of Symmetric Key Cryptography

54. Performance of Combining Hill Cipher Algorithm and Caesar Cipher Algorithm in Text Security

55. A New Modified Caesar Cipher Cryptography Method with LegibleCiphertext From a Message to Be Encrypted.

56. An Efficient Cryptographic Scheme for Text Message Protection Against Brute Force and Cryptanalytic Attacks.

57. Designing of Cryptography Based Security System for Cloud Computing.

58. PENERAPAN KOMBINASI METODE VIGENERE CIPHER, CAESAR CIPHER DAN SIMBOL BACA DALAM MENGAMANKAN PESAN

59. Fully Blind Data Hiding by Embedding Within DNA Sequences Using Various Ciphering and Generic Complimentary Base Substitutions

60. Decoding Secret Message with Frequency Analysis

61. Multi-cipher Encrypter Using Symmetric Key Algorithms

62. Implementation of Encryption Techniques in Secure Communication Model

63. Implementation of Audio Image Steganography—A Technique to Secure Data

64. S2NOW: Secure Social Network Ontology Using WhatsApp

65. Peningkatan Keamanan Kriptografi Caesar Cipher dengan Menerapkan Algoritma Kompresi Stout Codes

66. Contiki Cooja Security Solution (CCSS) with IPv6 Routing Protocol for Low-Power and Lossy Networks (RPL) in Internet of Things Applications

67. Modification Affine Cipher Transform Digraph to Squared the value of ‘n’ in Text Security

68. A Lightweight Effective Randomized Caesar Cipher Algorithm for Security of Data

69. Steganografi LSB Dengan Modifikasi Kriptografi: Caesar, Vigenere, Hill Cipher dan Playfair Pada Image

70. Information Hiding Application Using Digital Images Secured With Rijndael and Caesar Cipher Encryption

71. POSET: Pattern Oriented Security Encryption Technique

72. Security and Privacy in Medical Internet of Things and Cluster-Based Wireless Sensor Networks for Health Care

73. Cryptography Concepts: Confidentiality

74. An efficient and secure technique for image steganography using a hash function.

75. An Enhancement of One Time Pad Based on Monoalphabeth Caesar Cipher to Secure Grayscale Image

76. Cæsar Cipher

77. Atbah-Type Ciphers in the Christian Orient and Numerical Rules in the Construction of Christian Substitution Ciphers.

78. Encrypted Message Transmission Using Video File.

79. A Global Time Based Approach towards Communication.

80. Web Based Security System Academic Exam Questions Using Advanced Encryption Standard

81. An improved vigener algorithm based on circular-left-shift key and MSB binary for data security

82. A Modifying of Hill Cipher Algorithm with 3 Substitution Caesar Cipher

83. Combination of Caesar Cipher Modification with Transposition Cipher

85. A Novel Encryption Scheme Using Hybrid Cellular Automata

86. Mercurial Cipher: A New Cipher Technique and Comparative Analysis with Classical Cipher Techniques

87. Text Encryption using Extended Bit Circular Shift Cipher

88. Improved Secure Computation over Real Numbers and Its Application to Reliability Engineering

89. A Study of Vulnerability Analysis of Popular Smart Devices Through Their Companion Apps

90. Transfusion of Extended Vigenere Table and ASCII Conversion for Encryption Contrivance

91. Combining caesar cipher and hill cipher in the generating encryption key on the vigenere cipher algorithm

92. Implementation of Steganography Modified Least Significant Bit using the Columnar Transposition Cipher and Caesar Cipher Algorithm in Image Insertion

93. Classical Hybrid Technique – Substitution and Transposition Techniques

94. An approach for security of color image data in coordinate, geometric, and frequency domains

95. Coherent Caesar Cipher for Resource Constrained Devices

96. Mapping private keys into one public key using binary matrices and masonic cipher: Caesar cipher as a case study

97. Vigenere Cipher: Trends, Review and Possible Modifications

98. IMPLEMENTASI LEAST SIGNIFICANT BIT (LSB) DAN ALGORITMA VIGENERE CIPHER PADA AUDIO STEGANOGRAFI

99. Implementasi dan Penggunaan Algoritma Base64 dalam Pengamanan File Video

100. Pangamanan Pesan Menggunakan Kriptografi Caesar Cipher dan Steganografi EOF pada Citra

Catalog

Books, media, physical & digital resources