1.
Vandika AY, Tanjung T. Study Security Cloud with SHA-2 Algorithm. jptam [Internet]. 2023 Aug. 26 [cited 2025 Jul. 12];7(2):18154-7. Available from: https://jptam.org/index.php/jptam/article/view/9240