Return to Article Details A More Effective Approach Securing Text Data Based On Private Key Cryptography Download Download PDF