1.
Analysis of Possible Attacks on Data and Possible Solutions with Comparative Analysis of Various Encryption Algorithms and Evaluation . IJIREM. 2022;9(2):50-58. Accessed July 22, 2024. https://acspublisher.com/journals/index.php/ijirem/article/view/10916