Return to Article Details Trusted Data Transmission Using Data Scrambling Security Method with Asymmetric Key Algorithm for Synchronization Download Download PDF