Abstract

This paper deals with a method that provides in a multi-user environment file security of the order that even the system's people will be unable to break. The technique dealt with here is ASCII character by character encrypting of file using a KEY that is not physically stored anywhere in the magnetic media. This paper also covers problems encountered in the computer environment when using this technique.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call