[1]
P. R. S. M. P. S. S. K., “Resilient security against hackers using enchanced encryption techniques: Blowfish and Honey Encryption”, IJRITCC, vol. 4, no. 6, pp. 98–102, Jun. 2016.