1.
Alotaibi M, Al-hendi D, Alroithy B, AlGhamdi M, Gutub A. Secure Mobile Computing Authentication Utilizing Hash, Cryptography and Steganography Combination. JISCR [Internet]. 2019Apr.1 [cited 2024Dec.23];2(1):73-82. Available from: https://journals.nauss.edu.sa/index.php/JISCR/article/view/861