Privacy Preserving Secure Communication Pattern Using Cryptographic Technique Via Trusted Third Party (TTP) Model in Distributed Data Mining

Download Now
Provided by: IRD India
Topic: Security
Format: PDF
As security plays an important role in most of the applications where small change of data can lead to major problems. Thus, to secure the information there is need of a stronger encryption, which is very hard to break. In order to achieve better results and improve security, several levels of encryption have to be applied to the information and the way of encryption should not be vulnerable to attacks. Some of the conventional encryption methods are implemented for encryption, but can be cracked easily with the high end technologies.
Download Now

Find By Topic