(1)
Alotaibi, M.; Al-hendi, D.; Alroithy, B.; AlGhamdi, M.; Gutub, A. Secure Mobile Computing Authentication Utilizing Hash, Cryptography and Steganography Combination. JISCR 2019, 2, 73-82.