Return to Article Details A Proposed Approach for the Key Generation in Cryptography to Enrich the Data Confidentiality While Sharing Data over the Network Download Download PDF