[1]
A. Wijaya, M. Idris, L. Septiani, and G. . Pestalozi, “Systematic Literature Review: Cryptographic Protocols for Securing Genomic Data and Privacy”, méd. prof. j. of Lampung, vol. 15, no. 4, pp. 646-651, Aug. 2025.