[1]
B. M. R. K. D. G. T. A., “Blowfish Algorithm with Verifiable Outsourced using Cryptography”, IJRITCC, vol. 4, no. 10, pp. 113–116, Oct. 2016.