Return to Article Details Development of an algorithm to protect user communication devices against data leaks Download Download PDF