1.
Location-Based Cryptographic Techniques for Data Protection. MJoSHT [Internet]. 2019 Nov. 1 [cited 2025 Jul. 6];4(Special Issue). Available from: https://mjosht.usim.edu.my/index.php/mjosht/article/view/85