Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.38101/sisfotek.v8i1.176
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.38101/sisfotek.v10i1.275
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (747.076 KB) | DOI: 10.38101/sisfotek.v10i1.275
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (972.649 KB) | DOI: 10.38101/sisfotek.v8i1.176
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.34127/jrlab.v10i1.395
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.58738/encryption.v3i1.581
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35870/ijsecs.v5i2.5169
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.56403/bejam.v2i3.163
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar