[1]
A. . Maurya and M. . Joshi, “Exploring Privacy-Preserving Strategies: A Comprehensive Analysis of Group-Based Anonymization and Hybrid ECC Encryption Algorithm for Effective Performance Evaluation in Data Security”, Int J Intell Syst Appl Eng, vol. 12, no. 13s, pp. 517–527, Jan. 2024.