MLA
Kumar, M. Ravi, et al. "Analysis of Encryption and Compression Techniques for Hiding Secured Data Transmission." Advanced Practical Approaches to Web Mining Techniques and Application, edited by Ahmed J. Obaid, et al., IGI Global, 2022, pp. 266-279. https://doi.org/10.4018/978-1-7998-9426-1.ch014
APA
Kumar, M. R., Priyadarshini, K. M., Santhosh, C., Prasanna, J. L., & Likitha, G. U. (2022). Analysis of Encryption and Compression Techniques for Hiding Secured Data Transmission. In A. Obaid, Z. Polkowski, & B. Bhushan (Eds.), Advanced Practical Approaches to Web Mining Techniques and Application (pp. 266-279). IGI Global. https://doi.org/10.4018/978-1-7998-9426-1.ch014
Chicago
Kumar, M. Ravi, et al. "Analysis of Encryption and Compression Techniques for Hiding Secured Data Transmission." In Advanced Practical Approaches to Web Mining Techniques and Application, edited by Ahmed J. Obaid, Zdzislaw Polkowski, and Bharat Bhushan, 266-279. Hershey, PA: IGI Global, 2022. https://doi.org/10.4018/978-1-7998-9426-1.ch014
Export Reference