[1]
J. . Ayad, N. . Qaddoori, and H. . Maytham , Trans., “Enhanced Audio Encryption Scheme: Integrating Blowfish, HMAC-SHA256, and MD5 for Secure Communication”, Mesopotamian Journal of CyberSecurity, vol. 5, no. 1, pp. 178–186, Feb. 2025, doi: 10.58496/MJCS/2025/012.