Return to Article Details Research on Vulnerabilities in Computer Information Technology and Encryption Techniques Download Download PDF