[1]
“Data Security and Cryptography Substitution Techniques Algorithms implementation”, IJEIT, vol. 6, no. 1, Jun. 2024, doi: 10.36602/ijeit.v6i1.292.