[1]
“Encryption Techniques as Security Tools: A Technical Review”, IJARCS, vol. 3, no. 7, pp. 269–273, Jan. 2017, doi: 10.26483/ijarcs.v3i7.1456.