1.
Data Security and Cryptography Substitution Techniques Algorithms implementation. IJEIT. 2024;6(1). doi:10.36602/ijeit.v6i1.292