Volume :9 , Issue :4 ,Page :146-151
Abstract :In this paper, ‘three-way handshake methodology’ is employed to authenticate sharing information between multiple different users and administrator. Also the methodologies to share the information using matrix transformation with symmetric, hybrid symmetric and asymmetric procedures are given to ensure high security.