[1]
G. Mamidisetti, R. Makala, and R. K. Teja, “Analysis on Encryption and Compression Techniques for Information Security”, Int. J. Comp. Sci. Eng., vol. 7, no. 16, pp. 105–112, Nov. 2025.