Utilizing Encryption Keys Derived from Immunoaffinity Interactions as a Basis for Potential Security Enhancements

Saved in:
Bibliographic Details
Main Authors: Abby Cowley, Ashley Newland, Lenka Halámková, Richelle Manson, Jaleigh Morales, Jan Halámek
Format: Article
Language:English
Published: American Chemical Society 2025-02-01
Series:ACS Omega
Online Access:https://doi.org/10.1021/acsomega.4c10568
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1850024572141699072
author Abby Cowley
Ashley Newland
Lenka Halámková
Richelle Manson
Jaleigh Morales
Jan Halámek
author_facet Abby Cowley
Ashley Newland
Lenka Halámková
Richelle Manson
Jaleigh Morales
Jan Halámek
author_sort Abby Cowley
collection DOAJ
format Article
id doaj-art-172ab025f45f4fc3bafac62ef82e1ee8
institution DOAJ
issn 2470-1343
language English
publishDate 2025-02-01
publisher American Chemical Society
record_format Article
series ACS Omega
spelling doaj-art-172ab025f45f4fc3bafac62ef82e1ee82025-08-20T03:01:04ZengAmerican Chemical SocietyACS Omega2470-13432025-02-011066119612310.1021/acsomega.4c10568Utilizing Encryption Keys Derived from Immunoaffinity Interactions as a Basis for Potential Security EnhancementsAbby CowleyAshley NewlandLenka HalámkováRichelle MansonJaleigh MoralesJan Halámekhttps://doi.org/10.1021/acsomega.4c10568
spellingShingle Abby Cowley
Ashley Newland
Lenka Halámková
Richelle Manson
Jaleigh Morales
Jan Halámek
Utilizing Encryption Keys Derived from Immunoaffinity Interactions as a Basis for Potential Security Enhancements
ACS Omega
title Utilizing Encryption Keys Derived from Immunoaffinity Interactions as a Basis for Potential Security Enhancements
title_full Utilizing Encryption Keys Derived from Immunoaffinity Interactions as a Basis for Potential Security Enhancements
title_fullStr Utilizing Encryption Keys Derived from Immunoaffinity Interactions as a Basis for Potential Security Enhancements
title_full_unstemmed Utilizing Encryption Keys Derived from Immunoaffinity Interactions as a Basis for Potential Security Enhancements
title_short Utilizing Encryption Keys Derived from Immunoaffinity Interactions as a Basis for Potential Security Enhancements
title_sort utilizing encryption keys derived from immunoaffinity interactions as a basis for potential security enhancements
url https://doi.org/10.1021/acsomega.4c10568
work_keys_str_mv AT abbycowley utilizingencryptionkeysderivedfromimmunoaffinityinteractionsasabasisforpotentialsecurityenhancements
AT ashleynewland utilizingencryptionkeysderivedfromimmunoaffinityinteractionsasabasisforpotentialsecurityenhancements
AT lenkahalamkova utilizingencryptionkeysderivedfromimmunoaffinityinteractionsasabasisforpotentialsecurityenhancements
AT richellemanson utilizingencryptionkeysderivedfromimmunoaffinityinteractionsasabasisforpotentialsecurityenhancements
AT jaleighmorales utilizingencryptionkeysderivedfromimmunoaffinityinteractionsasabasisforpotentialsecurityenhancements
AT janhalamek utilizingencryptionkeysderivedfromimmunoaffinityinteractionsasabasisforpotentialsecurityenhancements