1.
Beckham O, Oldman G, Karrie J, Craig D. Techniques used to formulate confidential data by means of fragmentation and hybrid encryption. irjmis [Internet]. 15Oct.2019 [cited 11Jul.2020];6(6):68-6. Available from: https://sloap.org/journals/index.php/irjmis/article/view/766