Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 234,381,422 papers from all fields of science
Search
Sign In
Create Free Account
Base64
Known as:
Radix64
, Modified Base64
, Radix-64
Expand
Base64 is a group of similar binary-to-text encoding schemes that represent binary data in an ASCII string format by translating it into a radix-64…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
"Classic" Mac OS
8-bit clean
ASP.NET
Acid2
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
Perbandingan Kriptografi RSA dengan Base64
N. Ginting
,
Misalina Ginting
2017
Corpus ID: 198356597
Kriptografi mempelajari teknik-teknik matematika yang berhubungan dengan aspek keamanan informasi, seperti kerahasiaan data…
Expand
2016
2016
Multi Spatial Resolution for Image Spam Filtering
N. A. M. Ariff
,
A. Abdullah
,
M. F. Nasrudin
2016
Corpus ID: 64308726
Image spam filtering is a challenging task because spammers are constantly creating new tricks and making anti-spam filters…
Expand
2014
2014
Secure Wireless Sensor Network Updates Using OTAP And Performance of Symmetric Encryption Algorithms on Power Consumption
Mr. Charan R. Pote
,
Mr. Punesh U. Tembhare
,
Manoj G. Lade
2014
Corpus ID: 17695906
Wireless Sensor Networks (WSNs) face many challenges including reliability, flexibility and security. When WSNs deployed in…
Expand
2014
2014
The GeoHashTree: a multi-resolution data structure for the management of point clouds
N. Sabo
,
A. Beaulieu
,
D. Belanger
,
Y. Belzile
,
B. Piche
2014
Corpus ID: 21116042
Over a number of years, lidar has become one of the major elevation-data acquisition technologies. However, the management of…
Expand
2012
2012
PENERAPAN ALGORITMA GABUNGAN RC4 DAN BASE64 PADA SISTEM KEAMANAN E-COMMERCE
Febrian Wahyu Christanto
,
Adriana . P Rahangiar
,
Febry de Fretes
2012
Corpus ID: 112633527
Kriptografi adalah suatu ilmu yang mempelajari bagaimana cara menjaga agar data atau pesan tetap aman saat dikirimkan, dari…
Expand
2012
2012
Histogram based comparison on Symmetric Encryption Algorithms of Information Security
D. N. Swetha
2012
Corpus ID: 14926886
Information sharing and transfer of secured data is a challenging issue in Internet and Network applications, so there is a need…
Expand
2011
2011
Design of a scalable radix-64 montgomery multiplier
Pla Information
2011
Corpus ID: 63276396
An improved version of Montgomery multiplier was proposed basing the Tenca's word based radix-8 Montgomery multiplier.Radix-64…
Expand
2010
2010
SMTP E-Mail Access Method: Hints, Tips, and Tricks
C. Hunley
2010
Corpus ID: 62019249
How do I specify multiple SMTP servers? What about authentication? Isn’t this message important? How do I play a trick on a…
Expand
2002
2002
A Compact Radix-64 54 54 CMOS Redundant Binary Parallel Multiplier
Sanghoon Lee
,
Seung-Jun Bae
,
Hong-June Park
2002
Corpus ID: 106517032
1993
1993
Reducing The Latency Of Floating-Point Arithmetic Operations
Nhon T. Quach
1993
Corpus ID: 59797603
Floating-point (FP) numbers are used in general-purpose scienti c computation and increasingly in digital signal processing and…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE
or Only Accept Required