Return to Article Details Secure Database Access and Transfer Using Public Key Cryptography Download Download PDF