A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2018; you can also visit the original URL.
The file type is application/pdf
.
Privacy Preserving Secure Communication Pattern using Cryptographic Technique via Trusted Third Party (TTP) Model in Distributed Data Mining
International Journal of Advanced Computer Engineering and Communication Technology
unpublished
As security plays an important role in most of the applications where small change of data can lead to major problems. Thus, to secure the information there is need of a stronger encryption, which is very hard to break. In order to achieve better results and improve security, several levels of encryption have to be applied to the information and the way of encryption should not be vulnerable to attacks. Some of the conventional encryption methods are implemented for encryption, but can be
fatcat:ropodj6mfbea3fh23u3fk64t6q