[1]
“High Security by using Triple Wrapping Feature and their Comparison”, GJCST, vol. 15, no. H2, pp. 9–15, Jan. 2015, Accessed: Feb. 04, 2026. [Online]. Available: https://testing.computerresearch.org/index.php/computer/article/view/100954