[1]
R. Rahmayani and H. M. yusdartono, “End-to-End Encryption Security Method ”, Jurnal Install, vol. 16, no. 05, pp. 17–22, Dec. 2024.