Data Security Using Tree Traversal
Keywords:
cryptography, encryption, decryption, hacker
Abstract
we all know that presently in 21st century one of the most emerging problem is Data Security. There is no guarantee that the data we have sent may be hacked by any Hacker or the data we have sent may reach correctly to the receiver or not. So many data security techniques have been emerged from past 2 to 3 years. But still we need a best technique to protect the data from third parties. Cryptography is an art of scrambling the data in order to provide security and confidentiality. Cryptography is being used in order for the securely transmission of the data. This paper provides a new idea for Data encryption and decryption in order to provide security for data.
Downloads
- Article PDF
- TEI XML Kaleidoscope (download in zip)* (Beta by AI)
- Lens* NISO JATS XML (Beta by AI)
- HTML Kaleidoscope* (Beta by AI)
- DBK XML Kaleidoscope (download in zip)* (Beta by AI)
- LaTeX pdf Kaleidoscope* (Beta by AI)
- EPUB Kaleidoscope* (Beta by AI)
- MD Kaleidoscope* (Beta by AI)
- FO Kaleidoscope* (Beta by AI)
- BIB Kaleidoscope* (Beta by AI)
- LaTeX Kaleidoscope* (Beta by AI)
How to Cite
Published
2015-03-15
Issue
Section
License
Copyright (c) 2015 Authors and Global Journals Private Limited
This work is licensed under a Creative Commons Attribution 4.0 International License.