Implementation of Tangent and Cotangent Rules to Provide Security in E-Communication

Provided by: International Journal of Computer Applications
Topic: Security
Format: PDF
In the data communication, the intriguing issue to provide data security and these led to comprise the many areas including the impregnable medium and trusted third party to maintain a database and various types of encryption techniques. These are main inducement of researchers in this area to protect the data from unauthorized users for malicious purpose. Therefore there are requires the different types of encryption and decryption techniques to secure the data. In the proposed paper, there are used the tangent and cotangent rules to generate the cipher and decipher at sending and receiving ends respectively.

Find By Topic