[1]
A. Gan, “Review on Cryptography Techniques in Network Security”, JICTIE, vol. 8, no. 1, pp. 125–135, Jul. 2021.