[1]
A. Pandey, “A Review of Various Data Compression Techniques for Secured Data Transfer”, IJAST, vol. 26, no. 2, pp. 06 - 10, Aug. 2019.