Author:
Mendrofa Elwinus H. A.,Purba Elwin Yunith,Siahaan Boy Yako,Sembiring Rahmad W
Subject
Management of Technology and Innovation,Physics and Astronomy (miscellaneous),Engineering (miscellaneous)
Reference17 articles.
1. Zaeniah, Bambang Eka Purnama, "An Analysis of Encryption and Decryption Application by using One Time Pad Algorithm", (IJACSA) International Journal of Advanced Computer Science and Applications, 6(9), 2015.
2. K Hashizume , "An analysis of security issues for cloud computing", Journal of Internet Services and Applications, a Springer open Journal: 1-13, 2013.
3. Michael Nieles, Kelley Dempsey, Victoria Yan Pillitteri, "An Introduction to Information Security", National Institute of Standards and Technology Special Publication 800-12 Revision 1, 2017.
4. William Stallings, "Cryptography and Network Security: Principles & Practices", Fifth edition, Prentice Hall, ISBN-13: 978-0136097044, 2010.
5. C. Bhardwaj, "Modification of Vigenère Cipher by Random Numbers, Punctuations & Mathematical Symbols," Journal of Computer Engineering (IOSRJCE) ISSN No: 2278-0661, 2012.
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献