1.
Analysis of Possible Attacks on Data and Possible Solutions with Comparative Analysis of Various Encryption Algorithms and Evaluation . IJIREM [Internet]. 2022 Apr. 30 [cited 2024 Aug. 25];9(2):50-8. Available from: https://acspublisher.com/journals/index.php/ijirem/article/view/10916