Return to Article Details Developing an algorithm and investigation its properties to generate protected data Download Download PDF