Return to Article Details Securing Distributed Database Using Extended Blowfish Algorithm Download Download PDF