Rasha Asker. “For Office Management System in Data Mining Application to Secure User Data, Study the Different Encryption Techniques”. Design Engineering (June 30, 2020): 168 - 173. Accessed May 6, 2024. http://thedesignengineering.com/index.php/DE/article/view/446.