[1]
Y. Cao, “Application of Cryptography Technology Based on Network Information Security”, JTPMS, vol. 5, no. 5, pp. 30–33, Jun. 2025.