[1]
Al-Asad, G., Al-Husainy, M., Bani-Hani, M., Al-Zu’bi, A., Albatienh, S. and Abuoliem, H. 2024. Comparative Assessment of Hash Functions in Securing Encrypted Images. Engineering, Technology & Applied Science Research. 14, 6 (Dec. 2024), 18750–18755. DOI:https://doi.org/10.48084/etasr.8961.