[1]
“Systematic analysis of data security protocols in cloud computing: Literature review”, Maskay, vol. 16, no. 1, pp. 23–32, Aug. 2025, doi: 10.24133/maskay.v16i1.4150.