Encryption Algorithm using 2-Dimension Key for Information Security
Crossref DOI link: https://doi.org/10.35940/ijeat.F9129.088619
Published Online: 2019-08-30
Update policy: https://doi.org/10.35940/beiesp.crossmarkpolicy
,
Bonde*, Sarika Y.
Bhadade, Prof. Dr. U. S.