[1]
A. Y. Vandika and T. Tanjung, “Study Security Cloud with SHA-2 Algorithm”, jptam, vol. 7, no. 2, pp. 18154–18157, Aug. 2023.