AJ Zargar, M Manzoor, T Mukhtar - International journal of Advanced …, 2017 - academia.edu
… else on the network does. It is done by using methods of encryption and decryption, wherein
… the public key of Y, it is now capable of communicating securely over the network by simply …