Secured Data Communication using Novel Modification to Hill Cipher Algorithm with Self Repetitive Matrix

Journal Title: UNKNOWN - Year 2013, Vol 2, Issue 3

Abstract

Secured Data Communication using Novel Modification to Hill Cipher Algorithm with Self Repetitive Matrix

Authors and Affiliations

Keywords

Related Articles

Some Contemporary Requirements for Maximum Sealing of Endodontic Space from the Apical Zone to Orifices - Case Series

In a number of researches, experimental methodologies and reviews of the endodontic literature concerning failed root canal treatment lack of adequate sealing (coronary and apically) was indicated. A penetration is forme...

Reflection of Bloom’s Taxonomy in the Learning Outcomes of Secondary Social Science Curriculum of Bangladesh

Reflection of Bloom’s Taxonomy in the Learning Outcomes of Secondary Social Science Curriculum of Bangladesh

Influence of Investment Groups on Creation of Small and Medium Size Enterprises in Nairobi County

This research project sought to establish the influence of investment groups on creation of small and medium size enterprises in Nairobi County. Investment groups are started by like-minded persons with a common vision g...

The Comparative Study of “Combined Lumbar Plexus Block and Low Dose Epidural Anesthesia” With “Epidural Anesthesia” for Surgeries Involving of Upper 1/3rd of Femur

"Combining epidural anaesthesia along with lumbar plexus block provides effective anaesthesia for operative procedure. It takes care of sparing of lateral cutaneous nerve distribution area, sacral plexus distribution are...

Data Loss Prevention: Secure Important Data & Prevent By Threats

it is very important to protect the business data from all kind of data breach attacks for every organization to maintain the brand reputation and customer faith. Security of data is the biggest challenges for the organi...

Download PDF file
  • EP ID EP335082
  • DOI -
  • Views 119
  • Downloads 0

How To Cite

(2013). Secured Data Communication using Novel Modification to Hill Cipher Algorithm with Self Repetitive Matrix. UNKNOWN, 2(3), -. https://europub.co.uk/articles/-A-335082