Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.60090/kjm.v4i2.1007.147-162
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.60090/kjm.v4i2.1009.112-127
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.58738/encryption.v3i1.577
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.29303/abdiinsani.v12i6.2650
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.59837/jpmba.v3i3.2318
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.59837/jpmba.v3i5.2676
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35746/jtim.v6i2.583
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.36595/misi.v9i1.1873
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35746/jtim.v8i1.893
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.55338/jumin.v7i1.8091