Data Security Using Tree Traversal

Article ID

CSTSDEP2BLR

Data Security Using Tree Traversal

L. Eswara Chandra Vidya Sagar
L. Eswara Chandra Vidya Sagar K L University
DOI

Abstract

we all know that presently in 21st century one of the most emerging problem is Data Security. There is no guarantee that the data we have sent may be hacked by any Hacker or the data we have sent may reach correctly to the receiver or not. So many data security techniques have been emerged from past 2 to 3 years. But still we need a best technique to protect the data from third parties. Cryptography is an art of scrambling the data in order to provide security and confidentiality. Cryptography is being used in order for the securely transmission of the data. This paper provides a new idea for Data encryption and decryption in order to provide security for data.

Data Security Using Tree Traversal

we all know that presently in 21st century one of the most emerging problem is Data Security. There is no guarantee that the data we have sent may be hacked by any Hacker or the data we have sent may reach correctly to the receiver or not. So many data security techniques have been emerged from past 2 to 3 years. But still we need a best technique to protect the data from third parties. Cryptography is an art of scrambling the data in order to provide security and confidentiality. Cryptography is being used in order for the securely transmission of the data. This paper provides a new idea for Data encryption and decryption in order to provide security for data.

L. Eswara Chandra Vidya Sagar
L. Eswara Chandra Vidya Sagar K L University

No Figures found in article.

L. Eswara Chandra Vidya Sagar. 2015. “. Global Journal of Computer Science and Technology – C: Software & Data Engineering GJCST-C Volume 15 (GJCST Volume 15 Issue C3): .

Download Citation

Journal Specifications

Crossref Journal DOI 10.17406/gjcst

Print ISSN 0975-4350

e-ISSN 0975-4172

Issue Cover
GJCST Volume 15 Issue C3
Pg. 19- 21
Classification
GJCST-C Classification: G.2.2
Keywords
Article Matrices
Total Views: 8451
Total Downloads: 2228
2026 Trends
Research Identity (RIN)
Related Research
Our website is actively being updated, and changes may occur frequently. Please clear your browser cache if needed. For feedback or error reporting, please email [email protected]

Request Access

Please fill out the form below to request access to this research paper. Your request will be reviewed by the editorial or author team.
X

Quote and Order Details

Contact Person

Invoice Address

Notes or Comments

This is the heading

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

High-quality academic research articles on global topics and journals.

Data Security Using Tree Traversal

L. Eswara Chandra Vidya Sagar
L. Eswara Chandra Vidya Sagar K L University

Research Journals