Raw Data Security By Using Elgamal And Sha 256 Public Key Algorithm

IS Permana, T Hidayat, R Mahardiko - Teknokom, 2021 - teknokom.unwir.ac.id
The development of information technology has grown exponentially and various of data
collections and its method has been obtained. In the era of big data, data has now become …