Found 10 Documents
Search
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.60090/kjm.v4i2.1007.147-162
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.60090/kjm.v4i2.1009.112-127
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35746/jtim.v6i2.583
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.70340/jirsi.v4i1.179
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.70340/jirsi.v4i1.180
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.58738/encryption.v3i1.577
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.70340/jirsi.v4i2.194
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.29303/abdiinsani.v12i6.2650
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.59837/jpmba.v3i3.2318
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.59837/jpmba.v3i5.2676