Journal of Engineering and Applied Sciences
Year:
2017
Volume:
12
Issue:
5
Page No.
1186 - 1191
References
Arai, K., S. Kapoor and R. Bhatia, 2014. Intelligent System in Science and Information. Springer, Berlin, Germany, ISBN:978-3-319-14653-9, Pages: 414.
Kester, Q.A., 2012. A cryptosystem based on Vigenere cipher with varying key. Intl. J. Adv. Res. Comput. Eng. Technol., 1: 108-113.
Direct Link | Kester, Q.A., 2013. A hybrid cryptosystem based on Vigenere cipher and columnar transposition cipher. Intl. J. Adv. Technol. Eng. Res., 3: 141-147.
Direct Link | Khalaf, E.T., N. Sulaiman and M.N. Mohammad, 2013. Anti-forensic steganography method based on randomization. Global J. Technol., 4: 447-453.
Direct Link | Mousa, A., O.S. Faragallah, E.S. Rabaie and E.M. Nigm, 2013. Security analysis of reverse encryption algorithm for databases. Intl. J. Comput. Appl., 66: 19-27.
CrossRef | PubMed | Direct Link | Naji, M.A., 2014. Implementation of encryption data table by using multi-keys. Intl. J. Soft Comput. Eng., 4: 14-17.
Direct Link | Ramaraj, E., 2012. A novel encryption approach in database security. Intl. J. Comput. Organ. Trends, 2: 16-20.
Direct Link | Schneider, F.B., 2000. Enforceable security policies. ACM Trans. Inform. Syst. Secur., 3: 30-50.
Direct Link | Sharma, R., R. Sharma and H. Singh, 2012. Classical encryption techniques. Intl. J. Comput. Technol., 3: 84-90.
Direct Link | Stallings, W., 2005. Cryptography and Network Security Principles and Practices. 4th Edn., Prentice Hall, USA.