Data Security Using Tree Traversal
Data Security Using Tree Traversal
Article PDF

Keywords

cryptography
encryption
decryption
hacker

How to Cite

L. Eswara Chandra Vidya Sagar. (2015). Data Security Using Tree Traversal. Global Journal of Computer Science and Technology, 15(C3), 19–21. Retrieved from https://gjcst.com/index.php/gjcst/article/view/850

Abstract

we all know that presently in 21st century one of the most emerging problem is Data Security There is no guarantee that the data we have sent may be hacked by any Hacker or the data we have sent may reach correctly to the receiver or not So many data security techniques have been emerged from past 2 to 3 years But still we need a best technique to protect the data from third parties Cryptography is an art of scrambling the data in order to provide security and confidentiality Cryptography is being used in order for the securely transmission of the data This paper provides a new idea for Data encryption and decryption in order to provide security for data
Article PDF
Creative Commons License

This work is licensed under a Creative Commons Attribution 4.0 International License.

Copyright (c) 2015 Authors and Global Journals Private Limited