[1]
2022. Analysis of Possible Attacks on Data and Possible Solutions with Comparative Analysis of Various Encryption Algorithms and Evaluation . International Journal of Innovative Research in Engineering & Management. 9, 2 (Apr. 2022), 50–58.