Research Article
S2NOW: Secure Social Network Ontology Using WhatsApp
| Code | Value | Code | Value | Code | Value |
| 0 | SPACE | 37 | E | 74 | J | 1 | ! | 38 | F | 75 | K | 2 | “ | 39 | G | 76 | L | 3 | # | 40 | H | 77 | M | 4 | $ | 41 | I | 78 | N | 5 | % | 42 | J | 79 | O | 6 | & | 43 | K | 80 | P | 7 | ' | 44 | L | 81 | Q | 8 | ( | 45 | M | 82 | R | 9 | ) | 46 | N | 83 | S | 10 | | 47 | O | 84 | T | 11 | + | 48 | P | 85 | U | 12 | , | 49 | Q | 86 | V | 13 | - | 50 | R | 87 | W | 14 | . | 51 | S | 88 | X | 15 | / | 52 | T | 89 | Y | 16 | 0 | 53 | U | 90 | Z | 17 | 1 | 54 | V | 91 | { | 18 | 2 | 55 | W | 92 | | | 19 | 3 | 56 | X | 93 | } | 20 | 4 | 57 | Y | 94 | ∼ | 21 | 5 | 58 | Z | — | — | 22 | 6 | 59 | [ | — | — | 23 | 7 | 60 | \ | — | — | 24 | 8 | 61 | ] | — | — | 25 | 9 | 62 | ^ | — | — | 26 | : | 63 | _ | — | — | 27 | ; | 64 | ` | — | — | 28 | < | 65 | A | — | — | 29 | = | 66 | B | — | — | 30 | > | 67 | C | — | — | 31 | ? | 68 | D | — | — | 32 | @ | 69 | E | — | — | 33 | A | 70 | F | — | — | 34 | B | 71 | G | — | — | 35 | C | 72 | H | — | — | 36 | D | 73 | I | — | — |
|
|