Reference Citations - HerongYang.com - v2.95, by Herong Yang
Optimized Hybrid Security Model using Base 64 Algorithm
'Base64 Encoding Algorithm' tutorial was cited in a 'IJCSNS (International Journal of Computer Science and Network Security)' paper in 2018.
The Base64 Encoding Algorithm tutorial was cited in a "IJCSNS (International Journal of Computer Science and Network Security)" paper in 2018.
Subject: Optimized Hybrid Security Model using Base 64 Algorithm in conjunction with Substitution Cipher to Enhance Text Security Date: Mar 5, 2018 Author: Abdullah Maitlo, Rafaqat Hussain Arain, ... Source: http://paper.ijcsns.org/07_book/201803/20180313.pdf Summary Social business has improved the ability of managers and stakeholders when decision making. However, existing information security systems provide insufficient practice for information protection while transferring information; hackers access valuable information and break encryption codes applied to text messages. This paper presents the development of an Optimized Hybrid Security Model using Base 64 Algorithm and Substitution in Conjunction to enhance message security. This research is a prototype for the user input of message and security key in Hypertext Preprocessor using JQuery. The developed system needs the input of the plain text and the security key. Initially, Base 64 algorithm encrypts plain text into cypher text with the security key and then the Substitution Cipher encrypts the key into a cypher secured key. For testing, 300 text messages were input with different security keys. This research is a step forward in securing text messages; it can be used to encrypt text between sender and receiver through email, or it can be applied on instant messaging services and also can be used for stronger password encryption. ... References ... [21] D. H. Yang, "Base64 Encoding Algorithm," Data Encodings - Herong's Tutorial, 2010. [Online]. Available: https://www.herongyang.com/encoding/Base64-Encoding-Algorithm.html. [Accessed: 09-May-2012]. ...
Table of Contents
WSDL (วิสเด้าว์) เอกสารส่งข้อมูลของ Web Service (เว็บ เซอร์วิส)
Properly using .bind() in React...
Java Code Examples for java.sql.ResultSet.getAsciiStream()
►Optimized Hybrid Security Model using Base 64 Algorithm
Algoritmat Kriptografike dhe Siguria
C# (CSharp) RSAPublicKey Examples
Google Play Games Services works...
FISCO-BCOS - client.keystore Generation
DARE Algorithm: A New Security Protocol
SMA CRYPTOGRAPHY ALGORITHM DECRYPT MD5 SOLUTION
Labeless Part 5: Decrypt Strings in Boleto Banking Malware
Agregator internetskih radijskih postaja
openssl 설정 pem 생성 - 프로그래밍 방식으로 SSL 인증서 확인