Fig 2 - uploaded by Md Ataullah
Content may be subject to copyright.
Model For Public Key (Asymmetric key Cryptography)

Model For Public Key (Asymmetric key Cryptography)

Source publication
Research
Full-text available
As we all know that the 21st century is a time where there is a generation of a large amount of data and these data require a virtual space which is termed as cloud and is defined as the provision of services in a timely, on-demand manner to scale up and scale down the resources. To secure the data we need some platform or software for its protecti...