Analysis of Possible Attacks on Data and Possible Solutions with Comparative Analysis of Various Encryption Algorithms and Evaluation . (2022). International Journal of Innovative Research in Engineering & Management, 9(2), 50–58. Retrieved from https://acspublisher.com/journals/index.php/ijirem/article/view/10916