1.
Vandika AY, Tanjung T. Study Security Cloud with SHA-2 Algorithm. jptam [Internet]. 2023 Aug. 26 [cited 2025 Feb. 6];7(2):18154-7. Available from: http://jptam.org/index.php/jptam/article/view/9240