(1)
Analysis of Possible Attacks on Data and Possible Solutions With Comparative Analysis of Various Encryption Algorithms and Evaluation . IJIREM 2022, 9 (2), 50-58.