(1)
, P. R. S. M. P. S. S. K. Resilient Security Against Hackers Using Enchanced Encryption Techniques: Blowfish and Honey Encryption. IJRITCC 2016, 4, 98-102.