[1]
R. Rajan, D. G. Murugaboopathi, and D. C.Parthasarathy, “Analysis and assessment of various cryptographic techniques based on a variety of features”, IJET, vol. 7, no. 1.9, pp. 28–33, Mar. 2018, doi: 10.14419/ijet.v7i1.9.9730.