Author:
Jitender ,Gupta Shailender,Dhall Sangeeta
Publisher
Springer Nature Singapore
Reference15 articles.
1. Mishra KK, Misra AK, Mueller P, Martinez Perez G, Bhatia SK, Wang Y (2014) ‘Recent advancements in computer & software technology’. Sci World J 2014: 1–1. doi: https://doi.org/10.1155/2014/609512
2. Danti A, Nayak R ‘Data encryption by excluding repetitive character in cipher text’. 7
3. ‘India 3rd In Data Breaches Till Nov | India Business News-Times of India’. https://timesofindia.indiatimes.com/business/india-business/india-3rd-in-data-breaches-till. Accessed 03 Apr 2022
4. ‘Eighth Annual Cost of Cybercrime Study | Accenture’. https://www.accenture.com/us- en/insights/security/eighth-annual-cost-cybercrime-study. Accessed 03 Apr 2022
5. Kaur M, Singh S, Kaur M (2021) Computational image encryption techniques: a comprehensive review. Math Probl Eng 2021:1–17. https://doi.org/10.1155/2021/5012496