[1]
R. Rahim, “An application data security with lempel-ziv welch and blowfish”, IJET, vol. 7, no. 2.9, pp. 71–73, Mar. 2018, doi: 10.14419/ijet.v7i2.9.13351.