1.
Beckham O, Oldman G, Karrie J, Craig D. Techniques used to formulate confidential data by means of fragmentation and hybrid encryption. irjmis [Internet]. 2019 Oct. 15 [cited 2024 Jul. 16];6(6):68-86. Available from: https://sloap.org/journals/index.php/irjmis/article/view/766