(1)
Al-Asad, G.; Al-Husainy, M.; Bani-Hani, M.; Al-Zu’bi, A.; Albatienh, S.; Abuoliem, H. Comparative Assessment of Hash Functions in Securing Encrypted Images. Eng. Technol. Appl. Sci. Res. 2024, 14, 18750-18755.