Return to Article Details Revisiting Shift Cipher Technique for Amplified Data Security Download Download PDF