[1]
D. E. A. D. J. J., “A Review on Various Methods of Cryptography for Cyber Security”, IJRITCC, vol. 6, no. 7, pp. 12–16, Jul. 2018.