[1]
N. S. Mohd Shamsuddin and S. Ali Pitchay, “Location-Based Cryptographic Techniques for Data Protection”, MJoSHT, vol. 4, no. Special Issue, Nov. 2019.