Return to Article Details ENCRYPTION AND DATA PROTECTION TECHNOLOGIES AND EVALUATION OF THE EFFECTIVENESS OF ALGORITHMS Download Download PDF