[1]
Z. Lu, “Exploration of Security Vulnerabilities and Encryption Technologies for Computer Information Technology Data”, International Journal of Advance in Applied Science Research, vol. 4, no. 6, pp. 46–51, Oct. 2025.