Visual execution of caesar cipher methods and its application
Visual Execution Of Caesar Cipher Methods And Its Application is developed for beginner to learn basic encryption process and inspect what is actually happen during encryption and decryption process in visualization approach. Most of cryptography tools developed and provide in the net is only able...
| Main Author: | Nur Syafiqa, Ismail |
|---|---|
| Format: | Undergraduates Project Papers |
| Language: | English |
| Published: |
2014
|
| Subjects: | |
| Online Access: | http://umpir.ump.edu.my/id/eprint/13353/ http://umpir.ump.edu.my/id/eprint/13353/1/FSKKP%20-%20NUR%20SYAFIQA%20ISMAIL.PDF |
Similar Items
A study of caesar cipher and transposition cipher in jawi messages
by: Mohd Lokman, Syiham, et al.
Published: (2018)
by: Mohd Lokman, Syiham, et al.
Published: (2018)
Implementation of hybrid encryption method using caesar cipher algorithm
by: Charomie, Tat Wi
Published: (2010)
by: Charomie, Tat Wi
Published: (2010)
Implementation of hybrid encryption method using caesar cipher algorithm
by: Tat Wi, Charomie
Published: (2010)
by: Tat Wi, Charomie
Published: (2010)
Iris template protection based on enhanced hill cipher
by: Khalaf, Emad Taha, et al.
Published: (2016)
by: Khalaf, Emad Taha, et al.
Published: (2016)
Cryptanalysis Of Block Ciphers: Generalization, Extensions And Integration
by: Phan, Raphael Chung Wei
Published: (2005)
by: Phan, Raphael Chung Wei
Published: (2005)
The Design Trends of Keystream Generator for Stream Cipher for High Immunity Attacks
by: Mostafa, Saifuldun, et al.
Published: (2016)
by: Mostafa, Saifuldun, et al.
Published: (2016)
Dynamic key scheduling algorithm for block ciphers using quasigroup string transformation
by: Hassan Disina, Abdulkadir
Published: (2018)
by: Hassan Disina, Abdulkadir
Published: (2018)
User requirement validation: challenge exploration in pre-project execution
by: Muhamad Idaham, Umar Ong, et al.
Published: (2020)
by: Muhamad Idaham, Umar Ong, et al.
Published: (2020)
Job recruitment system
by: Nur Syafiqa, Yusri
Published: (2019)
by: Nur Syafiqa, Yusri
Published: (2019)
P2R - A Pairwise Testing Strategy Supporting Execution Resumption
by: Helal, Mohammed H.S., et al.
Published: (2012)
by: Helal, Mohammed H.S., et al.
Published: (2012)
A document-like software visualization method for effective cognition of c-based software systems
by: Sulaiman, Shahida
Published: (2004)
by: Sulaiman, Shahida
Published: (2004)
The design of an FPGA-based processor with reconfigurable processor execution structure for internet of things (IoT) applications
by: Kiat, Wei Pau
Published: (2018)
by: Kiat, Wei Pau
Published: (2018)
2D text visualization for the retrieval of Malay documents
by: Kamal Ismail, Normaly, et al.
Published: (2012)
by: Kamal Ismail, Normaly, et al.
Published: (2012)
2D text visualization for the retrieval of Malay documents
by: Kamal Ismail, Normaly, et al.
Published: (2012)
by: Kamal Ismail, Normaly, et al.
Published: (2012)
The Construction Of Quantum Block Cipher For Grover Algorithm
by: Eid, Almazrooie Mishal
Published: (2018)
by: Eid, Almazrooie Mishal
Published: (2018)
Framework for Alternate Execution of Workflows Under Threat
by: Safdar, S., et al.
Published: (2010)
by: Safdar, S., et al.
Published: (2010)
Adoption Of Open Source Software In Malaysia: A Study Of Perceptions Of IT Executives
by: Lee, Yee Tak
Published: (2005)
by: Lee, Yee Tak
Published: (2005)
High performance visualization of human tumor growth software
by: Alias, Norma, et al.
Published: (2008)
by: Alias, Norma, et al.
Published: (2008)
Computer-based instrumentation system for temperature measurement using thermocouple in visual basic application (C.I.S.T.V.A.)
by: Muhamad Akmal, Ishak
Published: (2008)
by: Muhamad Akmal, Ishak
Published: (2008)
A novel hybrid supervised artificial neural network (ANN) for data visualization and classification to the application of mental disorder diagnosis
by: Md. Sarwar, Zahan Tapan
Published: (2008)
by: Md. Sarwar, Zahan Tapan
Published: (2008)
Capability of Primary School Pupils in Learning and Exploring Visual Programing Language = Keupayaan murid sekolah rendah mempelajari dan menerokai bahasa pengaturcaraan visual
by: Azniah, Ismail, et al.
Published: (2016)
by: Azniah, Ismail, et al.
Published: (2016)
Biologically Inspired Execution Framework for
Vulnerable Workflow Systems
by: Safdar, S., et al.
Published: (2009)
by: Safdar, S., et al.
Published: (2009)
Software visual specification for requirement engineering education
by: Fauziah, Zainuddin, et al.
Published: (2019)
by: Fauziah, Zainuddin, et al.
Published: (2019)
Software visual specification for requirement specification validation
by: Fauziah, Zainuddin, et al.
Published: (2018)
by: Fauziah, Zainuddin, et al.
Published: (2018)
A Chaos-Based Authenticated Cipher with Associated Data
by: Je, Sen Teh, et al.
Published: (2017)
by: Je, Sen Teh, et al.
Published: (2017)
Related-mode attacks on block cipher modes of operation
by: Phan, , RCW, et al.
Published: (2005)
by: Phan, , RCW, et al.
Published: (2005)
A Chaos-Based Authenticated Cipher with Associated Data
by: Je, Sen Teh, et al.
Published: (2017)
by: Je, Sen Teh, et al.
Published: (2017)
Comprehensive review of the development of the harmony search algorithm and its applications
by: Al-Omoush, A.A., et al.
Published: (2019)
by: Al-Omoush, A.A., et al.
Published: (2019)
Hop Restricted-AODV (HR-AODV) Routing and Its Applicability on Different Wireless Channels for Vehicular Network
by: Ahmad, Tanvir, et al.
Published: (2023)
by: Ahmad, Tanvir, et al.
Published: (2023)
A modified algorithm for the homotopy perturbation method with applications to Lotka-Volterra systems
by: Chowdhury, Md. Sazzad Hossien, et al.
Published: (2010)
by: Chowdhury, Md. Sazzad Hossien, et al.
Published: (2010)
JOMS: System architecture for telemetry and visualization on unmanned vehicle
by: Khalid, Hasnan, et al.
Published: (2012)
by: Khalid, Hasnan, et al.
Published: (2012)
WLAR-Viz: Weighted least association rules visualization
by: Noraziah, Ahmad, et al.
Published: (2012)
by: Noraziah, Ahmad, et al.
Published: (2012)
Clustering and visualization of failure modes using an evolving tree
by: Tay, Kai Meng, et al.
Published: (2015)
by: Tay, Kai Meng, et al.
Published: (2015)
Object Recognition Mobile App for Visually Impaired User
by: Won, Wei Cheng
Published: (2021)
by: Won, Wei Cheng
Published: (2021)
Steganography application for x-ray image of the transferred patient using least significant bit method
by: Nur Shazana, Matri
Published: (2019)
by: Nur Shazana, Matri
Published: (2019)
The effect of augmented reality on spatial visualization ability of elementary school student
by: Eh Phon, Danakorn Nincarean, et al.
Published: (2019)
by: Eh Phon, Danakorn Nincarean, et al.
Published: (2019)
An application of robust method in multiple linear regression model toward credit card debt
by: Azmi, Nur Amira, et al.
Published: (2018)
by: Azmi, Nur Amira, et al.
Published: (2018)
A blind multiple watermarks based on human visual characteristics
by: Ernawan, Ferda, et al.
Published: (2018)
by: Ernawan, Ferda, et al.
Published: (2018)
Direct Memory Loading Of An Operating System Through Preboot Execution In A Homogenous Computing Environment
by: Nair, Remesh Seth
Published: (2009)
by: Nair, Remesh Seth
Published: (2009)
Application of multistage homotopy-perturbation method for the solutions of the Chen system
by: Chowdhury, Md. Sazzad Hossien, et al.
Published: (2009)
by: Chowdhury, Md. Sazzad Hossien, et al.
Published: (2009)
Similar Items
-
A study of caesar cipher and transposition cipher in jawi messages
by: Mohd Lokman, Syiham, et al.
Published: (2018) -
Implementation of hybrid encryption method using caesar cipher algorithm
by: Charomie, Tat Wi
Published: (2010) -
Implementation of hybrid encryption method using caesar cipher algorithm
by: Tat Wi, Charomie
Published: (2010) -
Iris template protection based on enhanced hill cipher
by: Khalaf, Emad Taha, et al.
Published: (2016) -
Cryptanalysis Of Block Ciphers: Generalization, Extensions And Integration
by: Phan, Raphael Chung Wei
Published: (2005)