Polybius. Richard Laqueur
نویسندگان
چکیده
منابع مشابه
An Extended Version of the Polybius Cipher
This paper provides a security method which can be used for data that contains alphabets, numerals and some special symbols during their transmission. A discussion about cryptology and the existing Polybius cipher is made. The existing Polybius cipher is based on the use of a 5X5 matrix of letters constructed using numbers from 1 to 5. This square can allow the text that contains alphabets only...
متن کاملDevelopment of Modified Polybius Technique for Data Security
In present scenario sharing of information is increasing significantly. The information is being transmitted to different user and undergoes various passive and active attacks; therefore, the information security plays a challenging role in communication. Cryptography plays a vital role in secure wireless communication and provides an excellent solution to offer the necessary protection against...
متن کاملPolybius: Secure Web Single-Sign-On for Legacy Applications
Web-based interfaces to applications in all domains of university life are surging. Given the diverse demands in and the histories of universities, combined with the rapid IT industry developments, all attempts at a sole all-encompassing platform for single-sign-on (SSO) will remain futile. In this paper, we present an architecture for a meta-SSO, which is able to seamlessly integrate with a wi...
متن کاملRichard Jorgensen
the well-known tendency of particular maladies to show breed-specificity can be used to infer likely sharing of descent of the causative alleles. As made clear in the volume under review, this is as true of major-gene diseases such as copper toxicosis and various retinopathies, as it is of the more complex and more prevalent cardiomyopathies, cancers, and dermatitis. Conduction of clinical tria...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Classical Philology
سال: 1914
ISSN: 0009-837X,1546-072X
DOI: 10.1086/359899