1. Aguryanov, I., 2012. Types and methods of cryptographic transformations. https://www.securitylab.ru/blog/personal/aguryanov/29980.php/ (accessed 15 September 2021).
2. Multilevel protection of the information;Alekseev,2017
3. Principles of multilevel protection of the information;Alekseev;Infocommunication Technologies,2012
4. Hiding messages by scattering them in space;Alekseev;Infocommunication Technologies,2008
5. Bessani, A, Correia, M, Quaresma, B, Andre, F, Sousa, P., 2011. DepSky: dependable and secure storage in a cloud-of-clouds. Proceedings of the sixth conference on Computer systems. 31-46.