[1]
S. K. R. E. S. P. D. S. A., “Critical Analysis of Cryptography Methods Used for Secure Data Transmission”, IJRITCC, vol. 2, no. 5, pp. 1167–1171, May 2014.