[1]
“PROTECTING DATA ON NETWORKS USING CRYPTOGRAPHIC METHODS”, ICEDH, pp. 61–65, Sep. 2025, Accessed: Jan. 31, 2026. [Online]. Available: https://econfseries.com/index.php/4/article/view/2809