{"id":"https://openalex.org/W4226110326","doi":"https://doi.org/10.1145/3508072.3512287","title":"An approach to Improving Columnar Permutation Cipher for Wills in Distributed Systems of Law Firms","display_name":"An approach to Improving Columnar Permutation Cipher for Wills in Distributed Systems of Law Firms","publication_year":2021,"publication_date":"2021-12-15","ids":{"openalex":"https://openalex.org/W4226110326","doi":"https://doi.org/10.1145/3508072.3512287"},"language":"en","primary_location":{"id":"doi:10.1145/3508072.3512287","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3508072.3512287","pdf_url":null,"source":{"id":"https://openalex.org/S4363608372","display_name":"The 5th International Conference on Future Networks &amp; Distributed Systems","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"The 5th International Conference on Future Networks &amp; Distributed Systems","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5066534273","display_name":"Emeka Nwokedi","orcid":null},"institutions":[{"id":"https://openalex.org/I76661892","display_name":"Federal University of Technology Minna","ror":"https://ror.org/0568y3j03","country_code":"NG","type":"education","lineage":["https://openalex.org/I76661892"]}],"countries":["NG"],"is_corresponding":true,"raw_author_name":"Emeka Nwokedi","raw_affiliation_strings":["Federal University of Technology Minna, Nigeria"],"affiliations":[{"raw_affiliation_string":"Federal University of Technology Minna, Nigeria","institution_ids":["https://openalex.org/I76661892"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5023528910","display_name":"Oluwaseun Adeniyi Ojerinde","orcid":"https://orcid.org/0000-0003-0450-3986"},"institutions":[{"id":"https://openalex.org/I76661892","display_name":"Federal University of Technology Minna","ror":"https://ror.org/0568y3j03","country_code":"NG","type":"education","lineage":["https://openalex.org/I76661892"]}],"countries":["NG"],"is_corresponding":false,"raw_author_name":"Oluwaseun Adeniyi Ojerinde","raw_affiliation_strings":["Federal University of Technology Minna, Nigeria"],"affiliations":[{"raw_affiliation_string":"Federal University of Technology Minna, Nigeria","institution_ids":["https://openalex.org/I76661892"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5112367374","display_name":"Joseph A. Ojeniyi","orcid":null},"institutions":[{"id":"https://openalex.org/I76661892","display_name":"Federal University of Technology Minna","ror":"https://ror.org/0568y3j03","country_code":"NG","type":"education","lineage":["https://openalex.org/I76661892"]}],"countries":["NG"],"is_corresponding":false,"raw_author_name":"Joseph Ojeniyi","raw_affiliation_strings":["Federal University of Technology Minna, Nigeria"],"affiliations":[{"raw_affiliation_string":"Federal University of Technology Minna, Nigeria","institution_ids":["https://openalex.org/I76661892"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5051374958","display_name":"Solomon Adelowo Adepoju","orcid":"https://orcid.org/0000-0002-1128-4753"},"institutions":[{"id":"https://openalex.org/I76661892","display_name":"Federal University of Technology Minna","ror":"https://ror.org/0568y3j03","country_code":"NG","type":"education","lineage":["https://openalex.org/I76661892"]}],"countries":["NG"],"is_corresponding":false,"raw_author_name":"Solomon Adepoju","raw_affiliation_strings":["Federal University of Technology Minna, Nigeria"],"affiliations":[{"raw_affiliation_string":"Federal University of Technology Minna, Nigeria","institution_ids":["https://openalex.org/I76661892"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5066534273"],"corresponding_institution_ids":["https://openalex.org/I76661892"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.24546644,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"826","last_page":"833"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9969000220298767,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9969000220298767,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9929999709129333,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9821000099182129,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5686202645301819},{"id":"https://openalex.org/keywords/permutation","display_name":"Permutation (music)","score":0.5459007024765015},{"id":"https://openalex.org/keywords/cipher","display_name":"Cipher","score":0.5009667873382568},{"id":"https://openalex.org/keywords/transposition-cipher","display_name":"Transposition cipher","score":0.4365237355232239},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.35311204195022583},{"id":"https://openalex.org/keywords/running-key-cipher","display_name":"Running key cipher","score":0.31943708658218384},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3075162172317505},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.2442168891429901},{"id":"https://openalex.org/keywords/physics","display_name":"Physics","score":0.05820274353027344}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5686202645301819},{"id":"https://openalex.org/C21308566","wikidata":"https://www.wikidata.org/wiki/Q7169365","display_name":"Permutation (music)","level":2,"score":0.5459007024765015},{"id":"https://openalex.org/C2780221543","wikidata":"https://www.wikidata.org/wiki/Q4681865","display_name":"Cipher","level":3,"score":0.5009667873382568},{"id":"https://openalex.org/C71247151","wikidata":"https://www.wikidata.org/wiki/Q840498","display_name":"Transposition cipher","level":5,"score":0.4365237355232239},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.35311204195022583},{"id":"https://openalex.org/C64119674","wikidata":"https://www.wikidata.org/wiki/Q7380031","display_name":"Running key cipher","level":4,"score":0.31943708658218384},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3075162172317505},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.2442168891429901},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.05820274353027344},{"id":"https://openalex.org/C24890656","wikidata":"https://www.wikidata.org/wiki/Q82811","display_name":"Acoustics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3508072.3512287","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3508072.3512287","pdf_url":null,"source":{"id":"https://openalex.org/S4363608372","display_name":"The 5th International Conference on Future Networks &amp; Distributed Systems","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"The 5th International Conference on Future Networks &amp; Distributed Systems","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.5699999928474426,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":34,"referenced_works":["https://openalex.org/W1986869390","https://openalex.org/W2073990530","https://openalex.org/W2117185078","https://openalex.org/W2136676553","https://openalex.org/W2147954265","https://openalex.org/W2186823941","https://openalex.org/W2188625846","https://openalex.org/W2189495853","https://openalex.org/W2240581817","https://openalex.org/W2322498409","https://openalex.org/W2405786642","https://openalex.org/W2553970200","https://openalex.org/W2594252654","https://openalex.org/W2733733382","https://openalex.org/W2736624903","https://openalex.org/W2753587766","https://openalex.org/W2763183208","https://openalex.org/W2765319366","https://openalex.org/W2766512064","https://openalex.org/W2804558541","https://openalex.org/W2995328163","https://openalex.org/W2999280912","https://openalex.org/W3027597388","https://openalex.org/W3032363194","https://openalex.org/W3105635744","https://openalex.org/W3135253461","https://openalex.org/W4232217381","https://openalex.org/W4233922216","https://openalex.org/W4238294696","https://openalex.org/W4243400747","https://openalex.org/W4244842794","https://openalex.org/W6680069365","https://openalex.org/W6779086959","https://openalex.org/W6888500779"],"related_works":["https://openalex.org/W4388743740","https://openalex.org/W3030685797","https://openalex.org/W4298174230","https://openalex.org/W2111855876","https://openalex.org/W2408595026","https://openalex.org/W3213204265","https://openalex.org/W642550860","https://openalex.org/W2262391239","https://openalex.org/W2350007300","https://openalex.org/W2364146969"],"abstract_inverted_index":{"With":[0],"the":[1,6,116,124,131,162,167,182],"evolution":[2],"of":[3,42,68,84,126,133],"cryptography":[4],"in":[5],"twentieth":[7],"century,":[8],"classical":[9],"ciphers":[10],"(transposition":[11],"ciphers)":[12],"are":[13],"gradually":[14],"being":[15],"pushed":[16],"out":[17,80,147],"because":[18],"it":[19,52],"now":[20],"possesses":[21],"low":[22,48,100],"security":[23],"ratings,":[24],"however":[25],"we":[26],"can":[27],"still":[28],"salvage":[29],"them,":[30],"as":[31],"they":[32],"have":[33],"other":[34],"desirable":[35],"and":[36,47,51,71,94,103,135,142,154,156,177],"admirable":[37],"qualities":[38],"which":[39],"include:":[40],"easy":[41],"design,":[43],"medium":[44],"technical":[45],"know-how":[46,104],"computational":[49],"power":[50],"is":[53,87,119],"to":[54,88,114,121,137],"achieve":[55,115],"this":[56,58,85,129],"that":[57,97],"study;":[59],"\u201cA":[60],"three":[61],"layer":[62],"permutation":[63,75],"Cryptosystem":[64],"using":[65,148,158,166,181],"a":[66,138,159,173,186],"modification":[67],"Transposition":[69],"cipher":[70,163],"two":[72],"layers":[73],"content":[74],"for":[76],"Wills\u201d":[77],"was":[78,145],"carried":[79,146],".":[81],"The":[82,111],"aim":[83,118],"study":[86],"make":[89],"columnar":[90,122],"transposition":[91,123,160,169],"more":[92],"secure":[93],"relevant":[95],"so":[96],"companies":[98],"with":[99,172],"technology":[101],"budget":[102],"be":[105],"secured":[106],"from":[107],"known":[108],"cryptosystem":[109,170],"attack.":[110],"method":[112],"used":[113],"above":[117],"adding":[120],"technique":[125],"rail":[127],"cipher,":[128],"affected":[130],"sequence":[132],"transposition,":[134],"lead":[136],"new":[139],"encryption":[140],"equation":[141],"function.":[143],"Cryptanalysis":[144],"various":[149],"tools":[150],"(Cryptool":[151],"2,":[152],"Dcode":[153],"Countwordsfree)":[155],"parameters,":[157],"decoder":[161],"text":[164],"gotten":[165],"traditional":[168],"decrypted":[171],"hundred":[174],"percent":[175,188],"word":[176],"character":[178],"accuracy":[179],"whilst":[180],"improved":[183],"system":[184],"gave":[185],"thirty":[187],"accuracy.":[189]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
