{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:19:01Z","timestamp":1750220341054,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":49,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,12,15]],"date-time":"2021-12-15T00:00:00Z","timestamp":1639526400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,12,15]]},"DOI":"10.1145\/3508072.3512287","type":"proceedings-article","created":{"date-parts":[[2022,4,13]],"date-time":"2022-04-13T17:01:56Z","timestamp":1649869316000},"page":"826-833","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["An approach to Improving Columnar Permutation Cipher for Wills in Distributed Systems of Law Firms"],"prefix":"10.1145","author":[{"given":"Emeka","family":"Nwokedi","sequence":"first","affiliation":[{"name":"Federal University of Technology Minna, Nigeria"}]},{"given":"Oluwaseun","family":"Adeniyi Ojerinde","sequence":"additional","affiliation":[{"name":"Federal University of Technology Minna, Nigeria"}]},{"given":"Joseph","family":"Ojeniyi","sequence":"additional","affiliation":[{"name":"Federal University of Technology Minna, Nigeria"}]},{"given":"Solomon","family":"Adepoju","sequence":"additional","affiliation":[{"name":"Federal University of Technology Minna, Nigeria"}]}],"member":"320","published-online":{"date-parts":[[2022,4,13]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"October, 2015, doi: 10","author":"Oluwaseun O.","year":"2015","unstructured":"O. Oluwaseun , \u201c Strategies for Managing Information Flow in Nigeria Healthcare System Strategies for Managing Information Flow in Nigeria Healthcare System,\u201d no . October, 2015, doi: 10 .5120\/ijais 2015 451443. 10.5120\/ijais2015451443 O. Oluwaseun, \u201cStrategies for Managing Information Flow in Nigeria Healthcare System Strategies for Managing Information Flow in Nigeria Healthcare System,\u201d no. October, 2015, doi: 10.5120\/ijais2015451443."},{"key":"e_1_3_2_1_2_1","first-page":"3","article-title":"A Survey on Slow DDoS Attack Detection Techniques","author":"Akanji O. S.","year":"2020","unstructured":"O. S. Akanji , O. A. Abisoye , S. A. Bashir , and O. A. Ojerinde , \u201c A Survey on Slow DDoS Attack Detection Techniques ,\u201d ITED 2020 , vol. 3 , 2020. O. S. Akanji, O. A. Abisoye, S. A. Bashir, and O. A. Ojerinde, \u201cA Survey on Slow DDoS Attack Detection Techniques,\u201d ITED2020, vol. 3, 2020.","journal-title":"ITED"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.12785\/ijcnt\/030305"},{"issue":"4","key":"e_1_3_2_1_4_1","first-page":"30","article-title":"Efficient Digital Encryption Algorithm Based on Matrix Scrambling Technique","volume":"2","author":"K. K. M, M.","year":"2010","unstructured":"K. K. M, M. A. S, and S. Rasool , \u201c Efficient Digital Encryption Algorithm Based on Matrix Scrambling Technique ,\u201d Int. J. Netw. Secur. Its Appl. , vol. 2 , no. 4 , pp. 30 \u2013 41 , 2010 , doi: 10.5121\/ijnsa.2010.2403. 10.5121\/ijnsa.2010.2403 K. K. M, M. A. S, and S. Rasool, \u201cEfficient Digital Encryption Algorithm Based on Matrix Scrambling Technique,\u201d Int. J. Netw. Secur. Its Appl., vol. 2, no. 4, pp. 30\u201341, 2010, doi: 10.5121\/ijnsa.2010.2403.","journal-title":"Int. J. Netw. Secur. Its Appl."},{"key":"e_1_3_2_1_5_1","volume-title":"Attacking Transposition Cipher Using Improved Cuckoo Search","author":"Sadiq A. T.","year":"2014","unstructured":"A. T. Sadiq and L. Ali , \u201c Attacking Transposition Cipher Using Improved Cuckoo Search ,\u201d no. March 2014 , 2015. A. T. Sadiq and L. Ali, \u201cAttacking Transposition Cipher Using Improved Cuckoo Search,\u201d no. March 2014, 2015."},{"key":"e_1_3_2_1_6_1","volume-title":"StegoCrypt: Arithmetic and Rudin \u2013 Shapiro Sequence \u2013 Based Bit \u2013 Cycling and 3DES Bachelor Thesis","author":"El\u2013Beheiry M.","year":"2019","unstructured":"M. El\u2013Beheiry , \u201c StegoCrypt: Arithmetic and Rudin \u2013 Shapiro Sequence \u2013 Based Bit \u2013 Cycling and 3DES Bachelor Thesis ,\u201d 2019 . M. El\u2013Beheiry, \u201cStegoCrypt: Arithmetic and Rudin \u2013 Shapiro Sequence \u2013 Based Bit \u2013 Cycling and 3DES Bachelor Thesis,\u201d 2019."},{"key":"e_1_3_2_1_7_1","volume-title":"Spring 2015 Chris Christensen MAT\/CSC 483","author":"Christensen C.","year":"2015","unstructured":"C. Christensen , \u201c Spring 2015 Chris Christensen MAT\/CSC 483 ,\u201d 2015 . C. Christensen, \u201cSpring 2015 Chris Christensen MAT\/CSC 483,\u201d 2015."},{"key":"e_1_3_2_1_8_1","first-page":"20","volume-title":"Cryptanalysis of the Columnar Transposition Cipher with Long Keys","author":"Lasry G.","year":"2015","unstructured":"G. Lasry , M. Hayarden , and N. Kopal , \u201c Cryptanalysis of the Columnar Transposition Cipher with Long Keys ,\u201d pp. 1\u2013 20 , 2015 . G. Lasry, M. Hayarden, and N. Kopal, \u201cCryptanalysis of the Columnar Transposition Cipher with Long Keys,\u201d pp. 1\u201320, 2015."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.15623\/ijret.2013.0209049"},{"key":"e_1_3_2_1_10_1","volume-title":"Blockchain Technology and Smart Contracts: Privacy-preserving Tools","author":"Bergquist J.","year":"2017","unstructured":"J. Bergquist , \u201c Blockchain Technology and Smart Contracts: Privacy-preserving Tools ,\u201d no. 17023, p. 62, 2017 . J. Bergquist, \u201cBlockchain Technology and Smart Contracts: Privacy-preserving Tools,\u201d no. 17023, p. 62, 2017."},{"key":"e_1_3_2_1_11_1","first-page":"30","volume-title":"April","author":"Ojeniyi I.","year":"2018","unstructured":"I. I. and A. M. S. Ojeniyi , Joseph A, Bolaji O. Adedayo , \u201c Hybridized Technique for Copy-Move Forgery Detection Using Discrete Cosine Transform and Speeded-Up Robust Feature Techniques,\u201d no . April , pp. 22\u2013 30 , 2018 , doi: 10.5815\/ijigsp.2018.04.03. 10.5815\/ijigsp.2018.04.03 I. I. and A. M. S. Ojeniyi, Joseph A, Bolaji O. Adedayo, \u201cHybridized Technique for Copy-Move Forgery Detection Using Discrete Cosine Transform and Speeded-Up Robust Feature Techniques,\u201d no. April, pp. 22\u201330, 2018, doi: 10.5815\/ijigsp.2018.04.03."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.25046\/aj020504"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/ITCC.2004.1286714"},{"issue":"5","key":"e_1_3_2_1_14_1","first-page":"12","article-title":"Data encryption","volume":"37","author":"Hackworth R.","year":"1995","unstructured":"R. Hackworth , \u201c Data encryption ,\u201d Itnow , vol. 37 , no. 5 , pp. 12 \u2013 13 , 1995 , doi: 10.1093\/combul\/37.5.12. 10.1093\/combul R. Hackworth, \u201cData encryption,\u201d Itnow, vol. 37, no. 5, pp. 12\u201313, 1995, doi: 10.1093\/combul\/37.5.12.","journal-title":"Itnow"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1080\/10658989409342465"},{"volume-title":"Poly Substitution Method for Encryption and Decryption","author":"Ambulkar J. K.","key":"e_1_3_2_1_16_1","unstructured":"J. K. Ambulkar , \u201c Poly Substitution Method for Encryption and Decryption ,\u201d vol. 02, no. 05, pp. 1810\u20131812, 2010. J. K. Ambulkar, \u201cPoly Substitution Method for Encryption and Decryption,\u201d vol. 02, no. 05, pp. 1810\u20131812, 2010."},{"issue":"13","key":"e_1_3_2_1_17_1","first-page":"6","article-title":"Enhancing the Security of Caesar Cipher Substitution Method using a Randomized Approach for more Secure Communication","volume":"129","author":"Jain A.","year":"2015","unstructured":"A. Jain , R. Dedhia , and A. Patil , \u201c Enhancing the Security of Caesar Cipher Substitution Method using a Randomized Approach for more Secure Communication ,\u201d Int. J. Comput. Appl. , vol. 129 , no. 13 , pp. 6 \u2013 11 , 2015 , doi: 10.5120\/ijca2015907062. 10.5120\/ijca2015907062 A. Jain, R. Dedhia, and A. Patil, \u201cEnhancing the Security of Caesar Cipher Substitution Method using a Randomized Approach for more Secure Communication,\u201d Int. J. Comput. Appl., vol. 129, no. 13, pp. 6\u201311, 2015, doi: 10.5120\/ijca2015907062.","journal-title":"Int. J. Comput. Appl."},{"key":"e_1_3_2_1_18_1","volume-title":"Substitution Cipher with NonPrefix Codes","author":"Muralidhar R. B.","year":"2011","unstructured":"R. B. Muralidhar , \u201c Substitution Cipher with NonPrefix Codes ,\u201d 2011 . R. B. Muralidhar, \u201cSubstitution Cipher with NonPrefix Codes,\u201d 2011."},{"key":"e_1_3_2_1_19_1","first-page":"1","article-title":"An Infallible Technique for Hiding Confidential Data in Compressed Video using LSB and RSA Algorithm","author":"Idris I.","year":"2016","unstructured":"I. Idris , O. E. Oche , and J. K. Alhassan , \u201c An Infallible Technique for Hiding Confidential Data in Compressed Video using LSB and RSA Algorithm ,\u201d no. Icta , pp. 1 \u2013 5 , 2016 . I. Idris, O. E. Oche, and J. K. Alhassan, \u201cAn Infallible Technique for Hiding Confidential Data in Compressed Video using LSB and RSA Algorithm,\u201d no. Icta, pp. 1\u20135, 2016.","journal-title":"no. Icta"},{"volume-title":"Enhancing AES with Time-Bound and Feedback Artificial Agent Algorithms for Security and Tracking of Multimedia Data on Transition","author":"Isah A. O.","key":"e_1_3_2_1_20_1","unstructured":"A. O. Isah , J. K. Alhassan , and S. S. Olanrewaju , \u201c Enhancing AES with Time-Bound and Feedback Artificial Agent Algorithms for Security and Tracking of Multimedia Data on Transition ,\u201d vol. 6, no. 4, pp. 162\u2013178, 2017. A. O. Isah, J. K. Alhassan, and S. S. Olanrewaju, \u201cEnhancing AES with Time-Bound and Feedback Artificial Agent Algorithms for Security and Tracking of Multimedia Data on Transition,\u201d vol. 6, no. 4, pp. 162\u2013178, 2017."},{"key":"e_1_3_2_1_21_1","first-page":"1275","volume-title":"July","author":"Gupta R.","year":"2018","unstructured":"R. Gupta , P. K. Sadh , and P. Gautam , \u201c A Study of Implemented Classical Cipher,\u201d vol. 5, no . July , pp. 1270\u2013 1275 , 2018 , doi: 10.22214\/ijraset.2017.8180. 10.22214\/ijraset.2017.8180 R. Gupta, P. K. Sadh, and P. Gautam, \u201cA Study of Implemented Classical Cipher,\u201d vol. 5, no. July, pp. 1270\u20131275, 2018, doi: 10.22214\/ijraset.2017.8180."},{"key":"e_1_3_2_1_22_1","first-page":"105","article-title":"A Secure Method to Hide Confidential Data Using Cryptography and Steganography","author":"Alhassan J. K.","year":"2016","unstructured":"J. K. Alhassan , I. Ismaila , V. O. Waziri , and A. Abdulkadir , \u201c A Secure Method to Hide Confidential Data Using Cryptography and Steganography ,\u201d no. Icta , pp. 105 \u2013 110 , 2016 . J. K. Alhassan, I. Ismaila, V. O. Waziri, and A. Abdulkadir, \u201cA Secure Method to Hide Confidential Data Using Cryptography and Steganography,\u201d no. Icta, pp. 105\u2013110, 2016.","journal-title":"no. Icta"},{"key":"e_1_3_2_1_23_1","first-page":"84","volume-title":"Int. Conf. Sci. Technol. Educ. Arts, Manag. Soc. Sci. iSTEAMS","author":"Osho O.","year":"2014","unstructured":"O. Osho , Y. O. Zubair , J. A. Ojeniyi , and L. O. Osho , \u201c A SIMPLE ENCRYPTION AND DECRYPTION SYSTEM ,\u201d Int. Conf. Sci. Technol. Educ. Arts, Manag. Soc. Sci. iSTEAMS , pp. 77\u2013 84 , 2014 . O. Osho, Y. O. Zubair, J. A. Ojeniyi, and L. O. Osho, \u201cA SIMPLE ENCRYPTION AND DECRYPTION SYSTEM,\u201d Int. Conf. Sci. Technol. Educ. Arts, Manag. Soc. Sci. iSTEAMS, pp. 77\u201384, 2014."},{"key":"e_1_3_2_1_24_1","volume-title":"Nigerian Internet Fraud: Policy \/ Law Changes That Can Improve Effectiveness","author":"Adedipe A. A.","year":"2016","unstructured":"A. A. Adedipe , \u201c Nigerian Internet Fraud: Policy \/ Law Changes That Can Improve Effectiveness ,\u201d 2016 . A. A. Adedipe, \u201cNigerian Internet Fraud: Policy \/ Law Changes That Can Improve Effectiveness,\u201d 2016."},{"key":"e_1_3_2_1_25_1","first-page":"43","volume-title":"Transposition Cipher Text","author":"Jamal R.","year":"2012","unstructured":"R. Jamal , Z. Hussein , and S. By , \u201c Transposition Cipher Text ,\u201d pp. 1\u2013 43 , 2012 . R. Jamal, Z. Hussein, and S. By, \u201cTransposition Cipher Text,\u201d pp. 1\u201343, 2012."},{"issue":"8","key":"e_1_3_2_1_26_1","first-page":"1194","article-title":"Cryptanalysis of transposition ciphers with long key lengths using an improved genetic algorithm","volume":"21","author":"Heydari M.","year":"2013","unstructured":"M. Heydari , G. L. Shabgahi , and M. M. Heydari , \u201c Cryptanalysis of transposition ciphers with long key lengths using an improved genetic algorithm ,\u201d World Appl. Sci. J. , vol. 21 , no. 8 , pp. 1194 \u2013 1199 , 2013 , doi: 10.5829\/idosi.wasj.2013.21.8.22. 10.5829\/idosi.wasj.2013.21.8.22 M. Heydari, G. L. Shabgahi, and M. M. Heydari, \u201cCryptanalysis of transposition ciphers with long key lengths using an improved genetic algorithm,\u201d World Appl. Sci. J., vol. 21, no. 8, pp. 1194\u20131199, 2013, doi: 10.5829\/idosi.wasj.2013.21.8.22.","journal-title":"World Appl. Sci. J."},{"key":"e_1_3_2_1_27_1","first-page":"31","volume-title":"Transposition Ciphers","author":"Christensen C.","year":"2010","unstructured":"C. Christensen , \u201c Transposition Ciphers ,\u201d pp. 1\u2013 31 , 2010 . C. Christensen, \u201cTransposition Ciphers,\u201d pp. 1\u201331, 2010."},{"key":"e_1_3_2_1_28_1","volume-title":"Rail Fence Cipher Keyword Columnar Transposition","author":"Frost R.","year":"2009","unstructured":"R. Frost , \u201c Rail Fence Cipher Keyword Columnar Transposition ,\u201d vol. 124, no. Winter, 2009 . R. Frost, \u201cRail Fence Cipher Keyword Columnar Transposition,\u201d vol. 124, no. Winter, 2009."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.17485\/ijst\/2009\/v2i8.7"},{"key":"e_1_3_2_1_30_1","article-title":"Rail Fence Cryptography in Securing Information","author":"Utama A. S.","year":"2016","unstructured":"A. S. Utama , \u201c Rail Fence Cryptography in Securing Information ,\u201d Int. J. Sci. Eng. Res., no. July , 2016 . A. S. Utama, \u201cRail Fence Cryptography in Securing Information,\u201d Int. J. Sci. Eng. Res., no. July, 2016.","journal-title":"Int. J. Sci. Eng. Res., no."},{"key":"e_1_3_2_1_31_1","first-page":"95","volume-title":"S a Will","author":"Stout R.","year":"1938","unstructured":"R. Stout , \u201c Where There \u2019 S a Will ,\u201d pp. 1\u2013 95 , 1938 . R. Stout, \u201cWhere There \u2019 S a Will,\u201d pp. 1\u201395, 1938."},{"key":"e_1_3_2_1_32_1","first-page":"41","volume-title":"Types of Wills","author":"Gadzo A.","year":"2021","unstructured":"A. Gadzo , \u201c Types of Wills ,\u201d pp. 39\u2013 41 , 2021 . A. Gadzo, \u201cTypes of Wills,\u201d pp. 39\u201341, 2021."},{"key":"e_1_3_2_1_33_1","volume-title":"Chapter 1: Electronic Wills and the Future: When Today \u2019 s Techie Youth Become Tomorrow \u2019 s Testators","author":"Gee K. B.","year":"2009","unstructured":"K. B. Gee , \u201c Chapter 1: Electronic Wills and the Future: When Today \u2019 s Techie Youth Become Tomorrow \u2019 s Testators ,\u201d vol. 105, no. June 2009 , 2005. K. B. Gee, \u201cChapter 1: Electronic Wills and the Future: When Today \u2019 s Techie Youth Become Tomorrow \u2019 s Testators,\u201d vol. 105, no. June 2009, 2005."},{"key":"e_1_3_2_1_34_1","unstructured":"B. J. Lebowitz \u201cElectronic Wills: No Longer in a Galaxy Far Far Away \u201d vol. 64 no. 1 2017.  B. J. Lebowitz \u201cElectronic Wills: No Longer in a Galaxy Far Far Away \u201d vol. 64 no. 1 2017."},{"key":"e_1_3_2_1_35_1","volume-title":"AND REVIVAL OF ELECTRONIC WILLS LEGISLATION IN 2016 THROUGH 2019,\u201d","volume":"1298","author":"Krueger N.","unstructured":"N. Krueger , \u201c LIFE , DEATH , AND REVIVAL OF ELECTRONIC WILLS LEGISLATION IN 2016 THROUGH 2019,\u201d vol. 1298 , no. 2017, 2019. N. Krueger, \u201cLIFE , DEATH , AND REVIVAL OF ELECTRONIC WILLS LEGISLATION IN 2016 THROUGH 2019,\u201d vol. 1298, no. 2017, 2019."},{"issue":"0","key":"e_1_3_2_1_36_1","first-page":"67","article-title":"Electronic wills in South Africa","volume":"7","author":"Snail S.","year":"2014","unstructured":"S. Snail and N. Hall , \u201c Electronic wills in South Africa ,\u201d Digit. Evid. Electron. Signat. Law Rev. , vol. 7 , no. 0 , pp. 67 \u2013 70 , 2014 , doi: 10.14296\/deeslr.v7i0.1925. 10.14296\/deeslr.v7i0.1925 S. Snail and N. Hall, \u201cElectronic wills in South Africa,\u201d Digit. Evid. Electron. Signat. Law Rev., vol. 7, no. 0, pp. 67\u201370, 2014, doi: 10.14296\/deeslr.v7i0.1925.","journal-title":"Digit. Evid. Electron. Signat. Law Rev."},{"key":"e_1_3_2_1_37_1","volume-title":"Are electronic wills on the way?","author":"Eva S.","year":"2021","unstructured":"S. Eva , \u201c Are electronic wills on the way? ,\u201d 2021 . S. Eva, \u201cAre electronic wills on the way?,\u201d 2021."},{"key":"e_1_3_2_1_38_1","volume-title":"TECHNOLOGY AND WILLS \u2013 THE DAWN OF A NEW ERA COVID-19 special edition","author":"Martin K.","year":"2020","unstructured":"K. Martin , \u201c TECHNOLOGY AND WILLS \u2013 THE DAWN OF A NEW ERA COVID-19 special edition ,\u201d 2020 . K. Martin, \u201cTECHNOLOGY AND WILLS \u2013 THE DAWN OF A NEW ERA COVID-19 special edition,\u201d 2020."},{"issue":"13","key":"e_1_3_2_1_39_1","article-title":"Enhancing the Security of Caesar Cipher Substitution Method using a Randomized Approach for more Secure Communication","volume":"129","author":"Ronak Dedhia A. J.","year":"2015","unstructured":"A. J. Ronak Dedhia , Abhijit Patil , \u201c Enhancing the Security of Caesar Cipher Substitution Method using a Randomized Approach for more Secure Communication ,\u201d Int. J. Comput. Appl. , vol. 129 , no. 13 , 2015 , doi: 10.5120\/ijca2015907062. 10.5120\/ijca2015907062 A. J. Ronak Dedhia, Abhijit Patil, \u201cEnhancing the Security of Caesar Cipher Substitution Method using a Randomized Approach for more Secure Communication,\u201d Int. J. Comput. Appl., vol. 129, no. 13, 2015, doi: 10.5120\/ijca2015907062.","journal-title":"Int. J. Comput. Appl."},{"volume-title":"Design and Construction of Secure Digital Will System","author":"Wu T.","key":"e_1_3_2_1_40_1","unstructured":"T. Wu , Y. Chen , and H. Lin , \u201c Design and Construction of Secure Digital Will System ,\u201d vol. 13, no. 5, pp. 523\u2013530, 2016. T. Wu, Y. Chen, and H. Lin, \u201cDesign and Construction of Secure Digital Will System,\u201d vol. 13, no. 5, pp. 523\u2013530, 2016."},{"key":"e_1_3_2_1_41_1","first-page":"1033","article-title":"The Ultimate Transposition Cipher (UTC)","volume":"2015","author":"Samid G.","year":"2015","unstructured":"G. Samid , \u201c The Ultimate Transposition Cipher (UTC) .,\u201d IACR Cryptol. ePrint Arch. , vol. 2015 , p. 1033 , 2015 . G. Samid, \u201cThe Ultimate Transposition Cipher (UTC).,\u201d IACR Cryptol. ePrint Arch., vol. 2015, p. 1033, 2015.","journal-title":"IACR Cryptol. ePrint Arch."},{"volume-title":"Toward Secure Strong Designated Verifier Signature Scheme from Identity-Based System","author":"Lin H.","key":"e_1_3_2_1_42_1","unstructured":"H. Lin , \u201c Toward Secure Strong Designated Verifier Signature Scheme from Identity-Based System ,\u201d vol. 11, no. 4, pp. 315\u2013321, 2014. H. Lin, \u201cToward Secure Strong Designated Verifier Signature Scheme from Identity-Based System,\u201d vol. 11, no. 4, pp. 315\u2013321, 2014."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.19101\/IJATEE.2020.762150"},{"key":"e_1_3_2_1_44_1","volume-title":"A Multilevel Approach of Transposition Ciphers for Data Security over Cloud ISSN NO: 1869-9391 A Multilevel Approach of Transposition Ciphers for Data Security over Cloud","author":"Thakkar B.","year":"2021","unstructured":"B. Thakkar and B. Thankachan , \u201c A Multilevel Approach of Transposition Ciphers for Data Security over Cloud ISSN NO: 1869-9391 A Multilevel Approach of Transposition Ciphers for Data Security over Cloud ,\u201d no. May , 2021 . B. Thakkar and B. Thankachan, \u201cA Multilevel Approach of Transposition Ciphers for Data Security over Cloud ISSN NO: 1869-9391 A Multilevel Approach of Transposition Ciphers for Data Security over Cloud,\u201d no. May, 2021."},{"issue":"12","key":"e_1_3_2_1_45_1","first-page":"p9662","article-title":"A systematic study on classical cryptographic cypher in order to design a smallest cipher","volume":"9","author":"Hossain Biswas M. S.","year":"2019","unstructured":"M. S. Hossain Biswas , \u201c A systematic study on classical cryptographic cypher in order to design a smallest cipher ,\u201d Int. J. Sci. Res. Publ. , vol. 9 , no. 12 , p. p9662 , 2019 , doi: 10.29322\/ijsrp.9.12.2019.p9662. 10.29322\/ijsrp.9.12.2019.p9662 M. S. Hossain Biswas , \u201cA systematic study on classical cryptographic cypher in order to design a smallest cipher,\u201d Int. J. Sci. Res. Publ., vol. 9, no. 12, p. p9662, 2019, doi: 10.29322\/ijsrp.9.12.2019.p9662.","journal-title":"Int. J. Sci. Res. Publ."},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.31979\/etd.c27y-va9u"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.3384\/ecp2020171004"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1088\/1742-6596\/1339\/1\/012007"},{"key":"e_1_3_2_1_49_1","volume-title":"A Methodology for the Cryptanalysis of Classical Ciphers with Search Metaheuristics","author":"Lasry G.","year":"2017","unstructured":"G. Lasry , \u201c A Methodology for the Cryptanalysis of Classical Ciphers with Search Metaheuristics ,\u201d 2017 . G. Lasry, \u201cA Methodology for the Cryptanalysis of Classical Ciphers with Search Metaheuristics,\u201d 2017."}],"event":{"name":"ICFNDS 2021: The 5th International Conference on Future Networks & Distributed Systems","acronym":"ICFNDS 2021","location":"Dubai United Arab Emirates"},"container-title":["The 5th International Conference on Future Networks &amp; Distributed Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3508072.3512287","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3508072.3512287","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:12:31Z","timestamp":1750191151000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3508072.3512287"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,12,15]]},"references-count":49,"alternative-id":["10.1145\/3508072.3512287","10.1145\/3508072"],"URL":"https:\/\/doi.org\/10.1145\/3508072.3512287","relation":{},"subject":[],"published":{"date-parts":[[2021,12,15]]},"assertion":[{"value":"2022-04-13","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}