[1]
Rahim, R. et al. 2018. An application data security with lempel-ziv welch and blowfish. International Journal of Engineering & Technology. 7, 2.9 (Mar. 2018), 71–73. DOI:https://doi.org/10.14419/ijet.v7i2.9.13351.