[1]
R. Li, “Analysis of Key Technologies for Data Security Protection Based on Cloud Computing”, IJCSIT, vol. 4, no. 1, pp. 243–252, Sep. 2024, doi: 10.62051/ijcsit.v4n1.30.