Return to Article Details An asymmetric key encryption and decryption model incorporating optimization techniques for enhanced security and efficiency Download Download PDF