[HTML][HTML] A deeper look into cybersecurity issues in the wake of Covid-19: A survey

M Alawida, AE Omolara, OI Abiodun… - Journal of King Saud …, 2022 - Elsevier
This study analyzed the Coronavirus (COVID-19) crisis from the angle of cyber-crime,
highlighting the wide spectrum of cyberattacks that occurred around the world. The modus …

Drone cybersecurity issues, solutions, trend insights and future perspectives: a survey

AE Omolara, M Alawida, OI Abiodun - Neural computing and applications, 2023 - Springer
This paper presented an exhaustive survey on the security and privacy issues of drones.
These security concerns were thoroughly dissected, particularly the aspect of cybersecurity …

Revisiting shift cipher technique for amplified data security

R Verma, A Kumari, A Anand… - … of Computational and …, 2024 - ojs.bonviewpress.com
Ever since manual work is overtaken by technology and the rapid advancement in the
technologies for performing all kinds of work online has created new possibilities for the …

[PDF][PDF] A modified version of Vigenere cipher using 95× 95 table

K Nahar, P Chakraborty - International Journal of Engineering and …, 2020 - academia.edu
Cryptography is a current field of research at the moment as it can be crucial to offer
protection to extremely delicate and confidential records from criminal wrongdoings …

An enhanced cipher technique using vigenere and modified caesar cipher

D Gautam, C Agrawal, P Sharma… - … on Trends in …, 2018 - ieeexplore.ieee.org
Cryptography is one amongst the foremost fields of study lately because it is critical to keep
up the confidentiality of the info that is distributed over the network. There are a unit …

Enhancing the security of Caesar cipher substitution method using a randomized approach for more secure communication

A Jain, R Dedhia, A Patil - arxiv preprint arxiv:1512.05483, 2015 - arxiv.org
Caesar cipher is an ancient, elementary method of encrypting plain text message to protect it
from adversaries. However, with the advent of powerful computers there is a need for …

[PDF][PDF] Modified Vigenère cipher algorithm based on new key generation method

TH Hameed, HT Sadeeq - Indonesian Journal of Electrical …, 2022 - academia.edu
Nowadays, as communication and network technologies evolve in modern life, ensuring the
confidentiality of a cryptography system has become a critical requirement. The Vigenère …

[PDF][PDF] A complex transformation of monoalphabetic cipher to polyalphabetic cipher:(Vigenère-Affine cipher)

TM Aung, HH Naing, NN Hla - … Journal of Machine Learning and Computing, 2019 - ijml.org
Fast progression of digital data exchange in electronic way, information security is becoming
much more important in data storage and transmission on public communication networks …

[PDF][PDF] Vigenere cipher: trends, review and possible modifications

AAM Aliyu, A Olaniyan - International Journal of Computer …, 2016 - academia.edu
Vigenere cipher is one of the earliest known polyalphabetic cipher which was considered
secure for a very long time until 1917 when friedman and kasiski were able to break it by …

[PDF][PDF] Modified honey encryption scheme for encoding natural language message

AE Omolara, A Jantan - International Journal of Electrical and …, 2019 - researchgate.net
Conventional encryption schemes are susceptible to brute-force attacks. This is because
bytes encode utf8 (or ASCII) characters. Consequently, an adversary that intercepts a …