Privacy Preserving Secure Communication Pattern Using Cryptographic Technique Via Trusted Third Party (TTP) Model in Distributed Data Mining

As security plays an important role in most of the applications where small change of data can lead to major problems. Thus, to secure the information there is need of a stronger encryption, which is very hard to break. In order to achieve better results and improve security, several levels of encryption have to be applied to the information and the way of encryption should not be vulnerable to attacks. Some of the conventional encryption methods are implemented for encryption, but can be cracked easily with the high end technologies.

Subscribe to the Cybersecurity Insider Newsletter

Strengthen your organization's IT security defenses by keeping abreast of the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday

Subscribe to the Cybersecurity Insider Newsletter

Strengthen your organization's IT security defenses by keeping abreast of the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday

Resource Details

Provided by:
IRD India
Topic:
Security
Format:
PDF