2013
DOI: 10.5120/13808-1790
|View full text |Cite
|
Sign up to set email alerts
|

Implementation of Tangent and Cotangent rules to Provide Security in E-communication

Abstract: In the data communication, the intriguing issue to provide data security and these led to comprise the many areas including the impregnable medium and trusted third party to maintain a database and various types of encryption techniques. These are main inducement of researchers in this area to protect the data from unauthorized users for malicious purpose. Therefore there are requires the different types of encryption and decryption techniques to secure the data. In the proposed paper, there are used the Tange… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...

Citation Types

0
0
0

Publication Types

Select...

Relationship

0
0

Authors

Journals

citations
Cited by 0 publications
references
References 2 publications
0
0
0
Order By: Relevance

No citations

Set email alert for when this publication receives citations?