A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2018; you can also visit the original URL.
The file type is application/pdf
.
Encryption techniques & access control models for data security: A survey
2017
International Journal of Engineering & Technology
In the process of sending information from sender to receiver, an unauthorized user may work in an active way (update it) or passive way (read or delay in sending). There must be some techniques which assures receiver that whatever information received from authorized user as well as must be same as sent from sender side, in addition to this receiver never make Denial of service. Nowadays sharing of information or resources is a very common thing from single user to the network to the cloud.
doi:10.14419/ijet.v7i1.5.9130
fatcat:3vdhsrwhnva5nenhierkhkqqai