Return to Article Details Data Encryption and Anonymization Techniques for Enhanced Information System Security and Privacy Download Download PDF