Return to Article Details Techniques used to formulate confidential data by means of fragmentation and hybrid encryption Download Download PDF