A Hybrid Cryptosystem based on Vigenere cipher and Columnar Transposition cipher

QA Kester - arXiv preprint arXiv:1307.7786, 2013 - arxiv.org
Privacy is one of the key issues addressed by information Security. Through cryptographic
encryption methods, one can prevent a third party from understanding transmitted raw data …

[PDF][PDF] A cryptosystem based on Vigenère cipher with varying key

QA Kester - International Journal of Advanced Research in …, 2012 - researchgate.net
Security addresses. Through encryption one can prevent a third party from understanding
raw data during signal transmission. The encryption methods for enhancing the security of …

A visual cryptographic encryption technique for securing medical images

QA Kester - arXiv preprint arXiv:1307.7791, 2013 - arxiv.org
The increased growth in the use of transmission of multimedia medical contents over
unsecured and open networks provides insecurity for confidential patient information over …

A new hybrid asymmetric key-exchange and visual cryptographic algorithm for securing digital images

QA Kester, L Nana, AC Pascu - 2013 International Conference …, 2013 - ieeexplore.ieee.org
In today's cyber world where interception of data by third parties is very common, there is a
demanding need for encryption of data via secured and unsecured communication …

Influence of Protection Motivation Theory on Information Security Practices: The Case of Ghanaian Mobile Banking Merchants

P Danquah, H Matey, K Asiamah - Journal of Applied Science and …, 2024 - csirjasit.org
The mobile banking industry has grown to become Ghana's most popular digital financial
service (DFS). Since its inception in 2018, the first interoperable system in Africa has …

[PDF][PDF] Implementation of Strong Encryption Method Using Caesar Cipher Algorithm

MC RAO - academia.edu
In this paper, we have imported some innovative advancement to the popular Caesar cipher
algorithm, which perfectly eliminates its constitutional weaknesses. Here we ignore spaces …

[PDF][PDF] A Study of Implemented Classical Cipher Techniques for Better Security Solution

R Gupta, PK Sadh, P Gautam - academia.edu
The cryptography is a method of converting plan text data into non-readable form so that the
data can be protected from hacking. There are two main techniques used for converting data …