(1)
Location-Based Cryptographic Techniques for Data Protection. MJoSHT 2019, 4 (Special Issue). https://doi.org/10.33102/mjosht.v4iSpecial Issue.85.