[1]
“Hybrid Cryptographic Protocols for Securing Sensitive Data in Cloud-Based Applications”, SJAIBT, vol. 1, no. 1, pp. 5–9, Dec. 2024, Accessed: Aug. 30, 2025. [Online]. Available: https://sjaibt.org/index.php/j/article/view/2