Lu, Z. (2025) “Exploration of Security Vulnerabilities and Encryption Technologies for Computer Information Technology Data”, International Journal of Advance in Applied Science Research, 4(6), pp. 46–51. Available at: https://www.h-tsp.com/index.php/ijaasr/article/view/102 (Accessed: 6 November 2025).