[1]
“Authentication Comparison of Telecommunications Technology Using A3, A8, A5 and Rijndael Algorithms”, Inf. J. Ilm. Bid. Teknol. Inf. dan Komun., vol. 3, no. 2, pp. 74-83, Oct. 2018.