[1]
“Network Security Analysis Using Cryptography and Secure Hash-Based Identity Authentication”, IJITCE, vol. 13, no. 4, pp. 109–115, Nov. 2025, doi: 10.62647/IJITCE2025V13I4PP109-115.