Return to Article Details Sweep Formulas Applying to Encrypt Text Data Download Download PDF