[1]
“PROTECTING DATA ON NETWORKS USING CRYPTOGRAPHIC METHODS”, ICEDH, pp. 61–65, Sep. 2025, Accessed: Sep. 30, 2025. [Online]. Available: https://econfseries.com/index.php/4/article/view/2809