[1]
D. Hyka and A. Benusi, “Some Cryptographic Weakness and the Ways to Avoid Them in ICT Services of Developing Countries.”,
EJSD
, vol. 3, no. 2, p. 73, Jun. 2014.