[1]
Alotaibi, M., Al-hendi, D., Alroithy, B., AlGhamdi, M. and Gutub, A. 2019. Secure Mobile Computing Authentication Utilizing Hash, Cryptography and Steganography Combination. Journal of Information Security and Cybercrimes Research. 2, 1 (Apr. 2019), 73-82. DOI:https://doi.org/10.26735/16587790.2019.001.