Information sharing by spanning trees of a graph by labelled sequence as A key

1Citations
Citations of this article
2Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Keeping the Information Sharing to manage cyber risks as a key, Security Intelligence speaks about secured data every day in today’s world. Hence it is considered that Cyber security is a Data Analytics challenge. For this reason, many researchers were effectively working on privacy protection and Liability protection. As a supporting hand for these global issues to secure data transfer, we propose a method to encrypt and decrypt the messages instantly by spanning trees of a graph with labelled tree sequences.

Cite

CITATION STYLE

APA

Bala Manoj Kumar, P., Sai Teja, K., Manimaran, A., Deepa, G., & Praba, B. (2019). Information sharing by spanning trees of a graph by labelled sequence as A key. International Journal of Recent Technology and Engineering, 8(3), 3498–3503. https://doi.org/10.35940/ijrte.C5249.098319

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free