[PDF][PDF] Polybius square in cryptography: a brief review of literature

JCT Arroyo, CE Dumdumaya, AJP Delima - International Journal, 2020‏ - academia.edu
Cryptography is a method to secure sensitive data for storage and communication in the
presence of third parties called adversaries. One of the first recorded incidents of …

Network Security for IoT Device using Blockchain Technology

SA Goswami, KD Patel - 2023 14th International Conference on …, 2023‏ - ieeexplore.ieee.org
This study presents a summary of the use and development of blockchain in a variety of
Internet of Things enablement technologies. This encompasses not only the Merkle tree …

Integrating Cryptographic Security Features in Information System Barcodes for Self-Service Systems

A Ristyawan, D Harini, WI Zaman… - Advance …, 2024‏ - journal2.upgris.ac.id
Integrating services in an information system is necessary to provide services that can
optimize an information system. One of the systems in PKKMB activities that will be …

Base64 Malleability in Practice

K Chalkias, P Chatzigiannis - Proceedings of the 2022 ACM on Asia …, 2022‏ - dl.acm.org
Base64 encoding has been a popular method to encode binary data into printable ASCII
characters. It is commonly used in several serialization protocols, web, and logging …

[PDF][PDF] A Novel ASCII Code-based Polybius Square Alphabet Sequencer as Enhanced Cryptographic Cipher for Cyber Security Protection (APSAlpS-3CS)

JCT Arroyo, ARL Reyes… - International Journal of …, 2020‏ - researchgate.net
For all industries, cybersecurity is regarded as one of the major areas of concern that needs
to be addressed. Data and information in all forms should be safeguarded to avoid leakage …

Model for Preserving Privacy Data in URL Query Strings

S Orhpomma, V Mekthanavanh… - 2024 10th …, 2024‏ - ieeexplore.ieee.org
A challenge of data utilization is how to balance data utility and data privacy. For this reason,
several privacy preservation models have been proposed. However, they can be effective …

A Privacy Preservation Model for URL Query Strings Based of Local Links Based on Temporary Tables

S Riyana, K Sasujit, N Homdoung - ECTI Transactions on …, 2025‏ - ph01.tci-thaijo.org
Abstract The URL (Uniform Resource Locator) is a unique identifier for locating a resource
online. It generally includes a protocol (eg, HTTP or HTTPS), a subdomain (eg, WWW), a …

[PDF][PDF] A Modified Polybius Cipher with a New Element-in-Grid Sequencer

JCT Arroyo, AJP Delima - International Journal, 2020‏ - researchgate.net
This paper modifies the traditional Polybius square with a 5x5 grid through the introduction
of a new dynamic substitution-based matrix for ciphertext assignment. The modification is …

Base64 Malleability in Practice

P Chatzigiannis, K Chalkias - Cryptology ePrint Archive, 2022‏ - eprint.iacr.org
Base64 encoding has been a popular method to encode binary data into printable ASCII
characters. It is commonly used in several serialization protocols, web, and logging …

Implementación de un sistema de autenticación mediante validación biométrica para procesos bancarios

GR La Madrid Coz, RA Ruiz Toledo‏ - repositorioacademico.upc.edu.pe
El propósito principal del proyecto es la implementación de un sistema de autenticación
mediante validación biométrica, para procesos bancarios haciendo uso de una entrada de …