[1]
Rasha Asker, “For office management system in data mining application to secure user data, study the different encryption techniques”, DE, pp. 168 - 173, Jun. 2020.