1.
Sobia Sattar. Cryptographic Compression Techniques along with some Penetrating Attacks and Possible Security Measures. Research Journal Of Computer Science And Information Technology [Internet]. 2020Jun.25 [cited 2025Jun.7];4(2):43-7. Available from: https://lgurjcsit.lgu.edu.pk/lgurjcsit/article/view/133