[1]
“Network security and Cryptography”, IJFIAHM, vol. 3, no. 1, pp. 370–379, Mar. 2024, doi: 10.59367/eeqd1231.