[1]
L. . Reynolds and J. . Winks, “DATA PROTECTION TECHNIQUES: A CRYPTOGRAPHY APPROACH ”, JTS, vol. 3, no. 1, pp. 14–21, Mar. 2021.