[1]
A. S. Petrosyan and G. S. Petrosyan, “Selection of Methods to Provide End-to-End Email Traffic Security”, MPCS, vol. 46, pp. 50–54, Dec. 2021.