[PDF][PDF] Polybius square in cryptography: a brief review of literature
Cryptography is a method to secure sensitive data for storage and communication in the
presence of third parties called adversaries. One of the first recorded incidents of …
presence of third parties called adversaries. One of the first recorded incidents of …
Network Security for IoT Device using Blockchain Technology
This study presents a summary of the use and development of blockchain in a variety of
Internet of Things enablement technologies. This encompasses not only the Merkle tree …
Internet of Things enablement technologies. This encompasses not only the Merkle tree …
Integrating Cryptographic Security Features in Information System Barcodes for Self-Service Systems
Integrating services in an information system is necessary to provide services that can
optimize an information system. One of the systems in PKKMB activities that will be …
optimize an information system. One of the systems in PKKMB activities that will be …
Base64 Malleability in Practice
Base64 encoding has been a popular method to encode binary data into printable ASCII
characters. It is commonly used in several serialization protocols, web, and logging …
characters. It is commonly used in several serialization protocols, web, and logging …
[PDF][PDF] A Novel ASCII Code-based Polybius Square Alphabet Sequencer as Enhanced Cryptographic Cipher for Cyber Security Protection (APSAlpS-3CS)
For all industries, cybersecurity is regarded as one of the major areas of concern that needs
to be addressed. Data and information in all forms should be safeguarded to avoid leakage …
to be addressed. Data and information in all forms should be safeguarded to avoid leakage …
Model for Preserving Privacy Data in URL Query Strings
S Orhpomma, V Mekthanavanh… - 2024 10th …, 2024 - ieeexplore.ieee.org
A challenge of data utilization is how to balance data utility and data privacy. For this reason,
several privacy preservation models have been proposed. However, they can be effective …
several privacy preservation models have been proposed. However, they can be effective …
A Privacy Preservation Model for URL Query Strings Based of Local Links Based on Temporary Tables
Abstract The URL (Uniform Resource Locator) is a unique identifier for locating a resource
online. It generally includes a protocol (eg, HTTP or HTTPS), a subdomain (eg, WWW), a …
online. It generally includes a protocol (eg, HTTP or HTTPS), a subdomain (eg, WWW), a …
[PDF][PDF] A Modified Polybius Cipher with a New Element-in-Grid Sequencer
This paper modifies the traditional Polybius square with a 5x5 grid through the introduction
of a new dynamic substitution-based matrix for ciphertext assignment. The modification is …
of a new dynamic substitution-based matrix for ciphertext assignment. The modification is …
Base64 Malleability in Practice
Base64 encoding has been a popular method to encode binary data into printable ASCII
characters. It is commonly used in several serialization protocols, web, and logging …
characters. It is commonly used in several serialization protocols, web, and logging …
Implementación de un sistema de autenticación mediante validación biométrica para procesos bancarios
GR La Madrid Coz, RA Ruiz Toledo - repositorioacademico.upc.edu.pe
El propósito principal del proyecto es la implementación de un sistema de autenticación
mediante validación biométrica, para procesos bancarios haciendo uso de una entrada de …
mediante validación biométrica, para procesos bancarios haciendo uso de una entrada de …