[1]
O. Beckham, G. Oldman, J. Karrie, and D. Craig, “Techniques used to formulate confidential data by means of fragmentation and hybrid encryption”, irjmis, vol. 6, no. 6, pp. 68–86, Oct. 2019.