Utilizing Encryption Keys Derived from Immunoaffinity Interactions as a Basis for Potential Security Enhancements

Bioaffinity interactions allow antibodies and antigens to bind and were shown to successfully produce cryptographic keys for encryption in this research. This straightforward immune-system-based construct has shown that data obtained from immunoassay interactions may be utilized to create symmetrica...

Full description

Saved in:
Bibliographic Details
Published inACS omega Vol. 10; no. 6; pp. 6119 - 6123
Main Authors Cowley, Abby, Newland, Ashley, Halámková, Lenka, Manson, Richelle, Morales, Jaleigh, Halámek, Jan
Format Journal Article
LanguageEnglish
Published United States American Chemical Society 18.02.2025
Online AccessGet full text
ISSN2470-1343
2470-1343
DOI10.1021/acsomega.4c10568

Cover

Abstract Bioaffinity interactions allow antibodies and antigens to bind and were shown to successfully produce cryptographic keys for encryption in this research. This straightforward immune-system-based construct has shown that data obtained from immunoassay interactions may be utilized to create symmetrical key ciphers. The Advanced Encryption Standard (AES), the current standard method to encrypt and decrypt data, was implemented to show that biomolecules from immune systems can be applied to cryptography for security enhancements. When the sender and receiver use identical protocols and component concentrations, the symmetrical key ciphers can be encrypted and decrypted. Variable immunoassay concentrations, pH, temperature, and data point sorting protocols applied to encryption systems will prevent key repetition and alleviate the ability for unauthorized system access, which solves prominent issues in cryptography. This concept can also strengthen cryptographic processes by providing additional security levels of varying complexity using other indirect methods with this nontraditional immunoaffinity approach to current cipher algorithms.
AbstractList Bioaffinity interactions allow antibodies and antigens to bind and were shown to successfully produce cryptographic keys for encryption in this research. This straightforward immune-system-based construct has shown that data obtained from immunoassay interactions may be utilized to create symmetrical key ciphers. The Advanced Encryption Standard (AES), the current standard method to encrypt and decrypt data, was implemented to show that biomolecules from immune systems can be applied to cryptography for security enhancements. When the sender and receiver use identical protocols and component concentrations, the symmetrical key ciphers can be encrypted and decrypted. Variable immunoassay concentrations, pH, temperature, and data point sorting protocols applied to encryption systems will prevent key repetition and alleviate the ability for unauthorized system access, which solves prominent issues in cryptography. This concept can also strengthen cryptographic processes by providing additional security levels of varying complexity using other indirect methods with this nontraditional immunoaffinity approach to current cipher algorithms.
Bioaffinity interactions allow antibodies and antigens to bind and were shown to successfully produce cryptographic keys for encryption in this research. This straightforward immune-system-based construct has shown that data obtained from immunoassay interactions may be utilized to create symmetrical key ciphers. The Advanced Encryption Standard (AES), the current standard method to encrypt and decrypt data, was implemented to show that biomolecules from immune systems can be applied to cryptography for security enhancements. When the sender and receiver use identical protocols and component concentrations, the symmetrical key ciphers can be encrypted and decrypted. Variable immunoassay concentrations, pH, temperature, and data point sorting protocols applied to encryption systems will prevent key repetition and alleviate the ability for unauthorized system access, which solves prominent issues in cryptography. This concept can also strengthen cryptographic processes by providing additional security levels of varying complexity using other indirect methods with this nontraditional immunoaffinity approach to current cipher algorithms.
Bioaffinity interactions allow antibodies and antigens to bind and were shown to successfully produce cryptographic keys for encryption in this research. This straightforward immune-system-based construct has shown that data obtained from immunoassay interactions may be utilized to create symmetrical key ciphers. The Advanced Encryption Standard (AES), the current standard method to encrypt and decrypt data, was implemented to show that biomolecules from immune systems can be applied to cryptography for security enhancements. When the sender and receiver use identical protocols and component concentrations, the symmetrical key ciphers can be encrypted and decrypted. Variable immunoassay concentrations, pH, temperature, and data point sorting protocols applied to encryption systems will prevent key repetition and alleviate the ability for unauthorized system access, which solves prominent issues in cryptography. This concept can also strengthen cryptographic processes by providing additional security levels of varying complexity using other indirect methods with this nontraditional immunoaffinity approach to current cipher algorithms.Bioaffinity interactions allow antibodies and antigens to bind and were shown to successfully produce cryptographic keys for encryption in this research. This straightforward immune-system-based construct has shown that data obtained from immunoassay interactions may be utilized to create symmetrical key ciphers. The Advanced Encryption Standard (AES), the current standard method to encrypt and decrypt data, was implemented to show that biomolecules from immune systems can be applied to cryptography for security enhancements. When the sender and receiver use identical protocols and component concentrations, the symmetrical key ciphers can be encrypted and decrypted. Variable immunoassay concentrations, pH, temperature, and data point sorting protocols applied to encryption systems will prevent key repetition and alleviate the ability for unauthorized system access, which solves prominent issues in cryptography. This concept can also strengthen cryptographic processes by providing additional security levels of varying complexity using other indirect methods with this nontraditional immunoaffinity approach to current cipher algorithms.
Author Newland, Ashley
Halámek, Jan
Manson, Richelle
Cowley, Abby
Halámková, Lenka
Morales, Jaleigh
AuthorAffiliation Texas Tech University
Department of Environmental Toxicology, The Institute for Forensic Science
AuthorAffiliation_xml – name: Texas Tech University
– name: Department of Environmental Toxicology, The Institute for Forensic Science
Author_xml – sequence: 1
  givenname: Abby
  surname: Cowley
  fullname: Cowley, Abby
– sequence: 2
  givenname: Ashley
  surname: Newland
  fullname: Newland, Ashley
– sequence: 3
  givenname: Lenka
  surname: Halámková
  fullname: Halámková, Lenka
– sequence: 4
  givenname: Richelle
  surname: Manson
  fullname: Manson, Richelle
– sequence: 5
  givenname: Jaleigh
  surname: Morales
  fullname: Morales, Jaleigh
– sequence: 6
  givenname: Jan
  orcidid: 0000-0002-2085-5730
  surname: Halámek
  fullname: Halámek, Jan
  email: jan.halamek@ttu.edu
BackLink https://www.ncbi.nlm.nih.gov/pubmed/39989835$$D View this record in MEDLINE/PubMed
BookMark eNqNUcFu1DAQjVARLaV3TshHDmyxHcfrnBCUBVZUAqlwtibOeOtVYm_tpCh8PV6yrdoDEtJItt68eW9G73lx5IPHonjJ6DmjnL0Fk0KPGzgXhtFKqifFCRdLumClKI8e_I-Ls5S2lFImFVdcPiuOy7pWtSqrk-Lm5-A699v5DVl5E6fd4IInX3FK5CNGd4stsTH0ZN33ow9grfNumMjaDxjB7MmJQC7yAZJLxIZIvocB_eCgI1doxrinr_w1eIN9xtOL4qmFLuHZ4T0trj6tflx8WVx--7y-eH-5AFGVw4IrpritOW-5pFZWSkmsG6XqqkWRYbBcClBCtkahoI1A1Yh6WUoum5aXp8V6Vm0DbPUuuh7ipAM4_RcIcaMhDs50qNmSQ0N5ZUUua8oGLBjJ0SqODFFlLTZrjX4H0y_ountBRvU-C32XhT5kkWfezTO7semxNfnyCN2jRR53vLvWm3CrGVOCVnWVFV4fFGK4GTENunfJYNeBxzAmXbIl5dlJ1pn66qHZvctdzJlAZ4KJIaWI9n8OeDOP5I7ehjH6HNa_6X8Ae0_O0Q
Cites_doi 10.1016/0731-7085(87)80077-8
10.1021/acssynbio.9b00164
10.1038/ncomms11374
10.1038/21092
10.1016/j.snb.2013.06.050
10.1109/ICICES.2013.6508181
10.1002/bit.23017
10.1016/j.biosystems.2017.07.002
10.1016/0731-7085(89)80079-2
10.1142/7968
10.1002/anie.201107156
10.1373/clinchem.2005.051532
10.1016/0014-5793(71)80319-8
10.48550/arXiv.0912.4710
ContentType Journal Article
Copyright 2025 The Authors. Published by American Chemical Society
2025 The Authors. Published by American Chemical Society.
2025 The Authors. Published by American Chemical Society 2025 The Authors
Copyright_xml – notice: 2025 The Authors. Published by American Chemical Society
– notice: 2025 The Authors. Published by American Chemical Society.
– notice: 2025 The Authors. Published by American Chemical Society 2025 The Authors
DBID N~.
AAYXX
CITATION
NPM
7X8
5PM
ADTOC
UNPAY
DOA
DOI 10.1021/acsomega.4c10568
DatabaseName American Chemical Society (ACS) Open Access
CrossRef
PubMed
MEDLINE - Academic
PubMed Central (Full Participant titles)
Unpaywall for CDI: Periodical Content
Unpaywall
DOAJ Directory of Open Access Journals
DatabaseTitle CrossRef
PubMed
MEDLINE - Academic
DatabaseTitleList
PubMed

MEDLINE - Academic
Database_xml – sequence: 1
  dbid: N~.
  name: American Chemical Society (ACS) Open Access
  url: https://pubs.acs.org
  sourceTypes: Publisher
– sequence: 2
  dbid: DOA
  name: DOAJ Directory of Open Access Journals
  url: https://www.doaj.org/
  sourceTypes: Open Website
– sequence: 3
  dbid: NPM
  name: PubMed
  url: https://proxy.k.utb.cz/login?url=http://www.ncbi.nlm.nih.gov/entrez/query.fcgi?db=PubMed
  sourceTypes: Index Database
DeliveryMethod fulltext_linktorsrc
Discipline Chemistry
EISSN 2470-1343
EndPage 6123
ExternalDocumentID oai_doaj_org_article_172ab025f45f4fc3bafac62ef82e1ee8
10.1021/acsomega.4c10568
PMC11840595
39989835
10_1021_acsomega_4c10568
c631217257
Genre Journal Article
GroupedDBID 53G
AAFWJ
AAHBH
ABUCX
ACS
ADBBV
ADUCK
AFEFF
AFPKN
ALMA_UNASSIGNED_HOLDINGS
AOIJS
BCNDV
EBS
GROUPED_DOAJ
HYE
M~E
N~.
OK1
RPM
VF5
AAYXX
ABBLG
CITATION
NPM
7X8
5PM
ADTOC
EJD
ROL
UNPAY
ID FETCH-LOGICAL-a453t-28182f922d260f65886e9b8895de4922af264a846dc8e40b4e8b4973626bd23
IEDL.DBID ACS
ISSN 2470-1343
IngestDate Wed Aug 27 01:32:55 EDT 2025
Sun Sep 07 11:22:11 EDT 2025
Thu Aug 21 18:28:12 EDT 2025
Wed Oct 01 13:34:39 EDT 2025
Wed Feb 26 08:31:35 EST 2025
Tue Jul 01 05:29:08 EDT 2025
Wed Feb 19 03:11:15 EST 2025
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Issue 6
Language English
License https://creativecommons.org/licenses/by-nc-nd/4.0
2025 The Authors. Published by American Chemical Society.
Permits non-commercial access and re-use, provided that author attribution and integrity are maintained; but does not permit creation of adaptations or other derivative works (https://creativecommons.org/licenses/by-nc-nd/4.0/).
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-a453t-28182f922d260f65886e9b8895de4922af264a846dc8e40b4e8b4973626bd23
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 23
ORCID 0000-0002-2085-5730
OpenAccessLink https://proxy.k.utb.cz/login?url=http://dx.doi.org/10.1021/acsomega.4c10568
PMID 39989835
PQID 3170268369
PQPubID 23479
PageCount 5
ParticipantIDs doaj_primary_oai_doaj_org_article_172ab025f45f4fc3bafac62ef82e1ee8
unpaywall_primary_10_1021_acsomega_4c10568
pubmedcentral_primary_oai_pubmedcentral_nih_gov_11840595
proquest_miscellaneous_3170268369
pubmed_primary_39989835
crossref_primary_10_1021_acsomega_4c10568
acs_journals_10_1021_acsomega_4c10568
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 2025-Feb-18
PublicationDateYYYYMMDD 2025-02-18
PublicationDate_xml – month: 02
  year: 2025
  text: 2025-Feb-18
  day: 18
PublicationDecade 2020
PublicationPlace United States
PublicationPlace_xml – name: United States
PublicationTitle ACS omega
PublicationTitleAlternate ACS Omega
PublicationYear 2025
Publisher American Chemical Society
Publisher_xml – name: American Chemical Society
References ref9/cit9
ref17/cit17
ref6/cit6
Mandge T. (ref15/cit15) 2013
ref18/cit18
Tanenbaum A. S. (ref4/cit4) 2011
ref19/cit19
ref21/cit21
ref11/cit11
ref12/cit12
ref16/cit16
ref22/cit22
ref23/cit23
Kaufman C. (ref3/cit3) 2002
ref13/cit13
ref14/cit14
ref8/cit8
Adamatzky A. (ref10/cit10) 2012
ref5/cit5
ref1/cit1
Schneier B. (ref2/cit2) 2000
ref24/cit24
ref20/cit20
ref7/cit7
References_xml – ident: ref21/cit21
  doi: 10.1016/0731-7085(87)80077-8
– ident: ref23/cit23
– ident: ref12/cit12
  doi: 10.1021/acssynbio.9b00164
– ident: ref14/cit14
– ident: ref18/cit18
  doi: 10.1038/ncomms11374
– ident: ref17/cit17
  doi: 10.1038/21092
– ident: ref9/cit9
  doi: 10.1016/j.snb.2013.06.050
– volume-title: Network Security Private Communication in a Public World
  year: 2002
  ident: ref3/cit3
– start-page: 47
  volume-title: 2013 International Conference on Information Communication and Embedded Systems (ICICES)
  year: 2013
  ident: ref15/cit15
  doi: 10.1109/ICICES.2013.6508181
– ident: ref1/cit1
  doi: 10.1002/bit.23017
– ident: ref5/cit5
– volume-title: Computer Networks
  year: 2011
  ident: ref4/cit4
– ident: ref24/cit24
– volume-title: Secrets and Lies: Digital Security in a Networked World
  year: 2000
  ident: ref2/cit2
– ident: ref16/cit16
  doi: 10.1016/j.biosystems.2017.07.002
– ident: ref6/cit6
– ident: ref22/cit22
  doi: 10.1016/0731-7085(89)80079-2
– ident: ref7/cit7
– ident: ref8/cit8
  doi: 10.1142/7968
– volume-title: Handbook of Natural Computing
  year: 2012
  ident: ref10/cit10
– ident: ref13/cit13
  doi: 10.1002/anie.201107156
– ident: ref20/cit20
  doi: 10.1373/clinchem.2005.051532
– ident: ref19/cit19
  doi: 10.1016/0014-5793(71)80319-8
– ident: ref11/cit11
  doi: 10.48550/arXiv.0912.4710
SSID ssj0001682826
Score 2.2869053
Snippet Bioaffinity interactions allow antibodies and antigens to bind and were shown to successfully produce cryptographic keys for encryption in this research. This...
Bioaffinity interactions allow antibodies and antigens to bind and were shown to successfully produce cryptographic keys for encryption in this research. This...
SourceID doaj
unpaywall
pubmedcentral
proquest
pubmed
crossref
acs
SourceType Open Website
Open Access Repository
Aggregation Database
Index Database
Publisher
StartPage 6119
SummonAdditionalLinks – databaseName: DOAJ Directory of Open Access Journals
  dbid: DOA
  link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV1Nb9QwELWqXsoFQfkKBeRKcAApdOM4WftIS6tSBEIqlXqznNimkbZJabKg7a_n2UlWuwK1FySfHCexPWPPG49nhpDXZlIm2PaLGPuAiLkWMpaQhH5dmRx4O0uDBf_L1_z4jJ-cZ-crqb78nbA-PHA_cXsQsLqAYHYcxZVpoZ0uc2adYDaxNrj5QoytKFPhdCWHJsFGuyTk2J4u2-bS_tDveemTzYfIqmW7Jo1C0P5_Ic2_L0xuzesrvfitZ7MVaXT0gNwfYCT90Hf_Idmw9TbZOhiztz0iP8-6albdQDDRw7q8XoSdgX4G3ehHMN0va6j3LKGfvH9Io52rsLYXNBwQ9r4OLdUodF-3VUsBbem3pvNXi_Db0yHpHT594bkmuMk9JqdHh98PjuMhvUKseZZ2sY8DxZxkzECncUAiIreyEEJmxnJUawewpIFPTCksnxTcioLLqY9fUxiWPiGbdVPbZ4RmUzNNpNGJmRquoZYal4JBpcikneRSROQNploNi6NVwe7NEjWSRA0kicjbkRjqqo-1cUvbfU-tZTsfJTtUgHfUwDvqLt6JyO5IawXyeFOJrm0zbxVQFZRTkeYyIk972i9_BUgnJIBrRMQaV6z1Zf1JXV2EyN2J16cziVffLRnozqE-_x9D3SH3mM9c7FPZiBdks7ue25eAU13xKqycP-DOIa4
  priority: 102
  providerName: Directory of Open Access Journals
Title Utilizing Encryption Keys Derived from Immunoaffinity Interactions as a Basis for Potential Security Enhancements
URI http://dx.doi.org/10.1021/acsomega.4c10568
https://www.ncbi.nlm.nih.gov/pubmed/39989835
https://www.proquest.com/docview/3170268369
https://pubmed.ncbi.nlm.nih.gov/PMC11840595
https://doi.org/10.1021/acsomega.4c10568
https://doaj.org/article/172ab025f45f4fc3bafac62ef82e1ee8
UnpaywallVersion publishedVersion
Volume 10
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVABC
  databaseName: American Chemical Society (ACS) Open Access
  customDbUrl:
  eissn: 2470-1343
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0001682826
  issn: 2470-1343
  databaseCode: N~.
  dateStart: 20250121
  isFulltext: true
  titleUrlDefault: https://pubs.acs.org
  providerName: American Chemical Society
– providerCode: PRVABC
  databaseName: American Chemical Society (ACS) Open Access
  customDbUrl:
  eissn: 2470-1343
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0001682826
  issn: 2470-1343
  databaseCode: N~.
  dateStart: 20160731
  isFulltext: true
  titleUrlDefault: https://pubs.acs.org
  providerName: American Chemical Society
– providerCode: PRVABC
  databaseName: American Chemical Society (ACS) Open Access
  customDbUrl:
  eissn: 2470-1343
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0001682826
  issn: 2470-1343
  databaseCode: N~.
  dateStart: 20241022
  isFulltext: true
  titleUrlDefault: https://pubs.acs.org
  providerName: American Chemical Society
– providerCode: PRVABC
  databaseName: American Chemical Society Journals
  customDbUrl:
  eissn: 2470-1343
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0001682826
  issn: 2470-1343
  databaseCode: ACS
  dateStart: 20160731
  isFulltext: true
  titleUrlDefault: https://pubs.acs.org/action/showPublications?display=journals
  providerName: American Chemical Society
– providerCode: PRVAON
  databaseName: DOAJ Directory of Open Access Journals
  customDbUrl:
  eissn: 2470-1343
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0001682826
  issn: 2470-1343
  databaseCode: DOA
  dateStart: 20160101
  isFulltext: true
  titleUrlDefault: https://www.doaj.org/
  providerName: Directory of Open Access Journals
– providerCode: PRVHPJ
  databaseName: ROAD: Directory of Open Access Scholarly Resources
  customDbUrl:
  eissn: 2470-1343
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0001682826
  issn: 2470-1343
  databaseCode: M~E
  dateStart: 20160101
  isFulltext: true
  titleUrlDefault: https://road.issn.org
  providerName: ISSN International Centre
– providerCode: PRVAQN
  databaseName: PubMed Central
  customDbUrl:
  eissn: 2470-1343
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0001682826
  issn: 2470-1343
  databaseCode: RPM
  dateStart: 20160101
  isFulltext: true
  titleUrlDefault: https://www.ncbi.nlm.nih.gov/pmc/
  providerName: National Library of Medicine
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3Pb9MwFLZgHMZlG78LbDISHEBKVztOYh-30mmANiGVSbtZdmyziC4ZSzrUHfa38-ykHWUTTIpySFMnsT_7fc_P_h5Cb80gJzDs6wjGAR4xxUUkwBL6fmVS4NtJHCL4B4fp_hH7fJwcX8vk_B3Bp2Rb5XV1ar-rPst9lnh-Hz2gKSfe0doZjq_nU1LwHUJ2NcqyQURiFndRydsK8bYor5dsUZDsv41n3lwuuTotz9Tsl5pM_rBFe-ttUqM6SBj6JSg_-tNG9_PLmwKPd_jMDbTWUVK802LoEbpny8dodTjPBPcE_TxqiklxCUYOj8r8fBZGGfwFMIA_AoAvrMF-lwr-5PeaVMq5AsaJGQ6Tje2-iRorOPCuqosaA03GX6vGL1OCx467BHpQ9IlHYNhy9xSN90bfhvtRl6ohUiyJm8hrSlEnKDXgHzlgNTy1QnMuEmMZXFYOiJcCrmNybtlAM8s1E5nXwtGGxs_QSlmV9gXCSWYyIowiJjNMgYtrXAxgFzwRdpAK3kPvoKZk19FqGWLolMh59cmu-nro_bxp5Vmr2_GPe3d92y_u84rb4QK0j-w6sASipzQQRMfgcHmslVN5Sq3j1BJroZA3c-RIaB4fdlGlraa1BIYGji6PU9FDz1skLR4F9JALIME9xJcwtvQuy7-UxUlQASfeN08E_PXDAo7__dSXd6y-V-gh9YmOfeYb_hqtNOdTuwnsq9FbodtthbkLOB9cjeB8eNX_DcwxL5w
linkProvider American Chemical Society
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1Lb9QwEB6Vclgu5Q3L00hwACnLJnES-0iXVlv6EGJbqTfLjm0adUlKkwVtfz1jb7JloeIh5eQkjh-fPd9kPDMAL_UwD3HbVwHuAyygkvGAoyR060qnyLeT2Fvw9w_S8RH9cJwcr0HY-cJgI2qsqfZG_MvoAuFbLKu-mM9yQHOXLJ5dg-s-EIpjQ6PJ5W-VFFUIn2QtotkwCGMat8bJqypxIimvV0SSj9x_Fd38_dRkb1aeyfl3OZ3-JJK2b8KnZWf8SZTTwaxRg_zilziP_9XbW7DRElTyboGo27BmyjvQG3V54e7C16OmmBYXKPLIVpmfz_2eQ3YREeQ9wvmb0cT5rJAd53lSSWsL3DXmxP96XHhR1ETiRTZlXdQESTP5WDXu0BJ-dtKm08OqTxwevQPePZhsbx2OxkGbuCGQNImbwEWYiiyPIo3akkWOw1LDFWM80YZisbRIwyQyH50zQ4eKGqYoz1xkHKWj-D6sl1VpHgJJMp2FXMtQZ5pKVHi1jRH6nCXcDFPO-vAKR0q0y64W3qIehaIbPtEOXx9edzMszhZRPP7w7KaDwPI5F3_bF-AciXY5C6R9UiFdtBQvm8dKWpmnkbEsMqExWMmLDkACp8cZYWRpqlktkK-h2svilPfhwQJQy08hWWQcKXEf2ArUVtqyeqcsTnxM8NBp6gnHV98sUfnXrj76x-F7Dr3x4f6e2Ns52H0MNyKXAtnlxGFPYL05n5mnyMsa9cyvxB9V_DTG
linkToPdf http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1Lb9QwELZKkSgXxLsLBYwEB5BSNomT2Ef6WLUUVpVKpd4sJ7bbSEuyNFnQcuC397M3WVhRAVJOTjJxMjOebzyZGUJe6WERYtnPA6wDPGCKi0DAEjq90inwdhL7CP6ncXpwyj6cJWdrJOlzYTCJBpQaH8R3Wj3VtqswEL7DeP3FnKttVriG8fwGuQk8EjvxHv_c_rW1ksKN8I3WIpYNgzBmcRegvI6IM0tFs2KWfPX-6yDnn39ObsyqqZp_V5PJb2ZpdJfc6fAkfb8QgHtkzVT3ycZu38btAfl62paT8gcsFN2visu5XyLoERhI9yB934ymLsWEHrpEkVpZW0LJ59TvFC6SHhqqcNAd1ZQNBcalx3Xr_jHCY0-67ncgfeHEx-fLPSQno_3PuwdB12chUCyJ28AVhIqsiCIN58YCkvDUiJxzkWjDMKwsUJMCUNEFN2yYM8NzJjJXyCbXUfyIrFd1ZTYJTTKdhUKrUGeaKfin2saQVMETYYap4APyGp9adlrSSB8Aj0LZs0R2LBmQNz0z5HRRdOMv1-44bi2vc-Wy_QAESHbaJ4HSVA50ZxkOW8S5sqpII2N5ZEJjQORlz2sJ9riYiapMPWsk4BW8VB6nYkAeL3i_fBSwHRdAsAPCV6RiZS6rZ6rywpfwDp1jnQjc-nYpQP981Sf_-flekFvHeyP58XB89JTcjlzDYtfBhm-R9fZyZp4BRbX5c68zV4kFGe4
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Utilizing+Encryption+Keys+Derived+from+Immunoaffinity+Interactions+as+a+Basis+for+Potential+Security+Enhancements&rft.jtitle=ACS+omega&rft.au=Cowley%2C+Abby&rft.au=Newland%2C+Ashley&rft.au=Hal%C3%A1mkov%C3%A1%2C+Lenka&rft.au=Manson%2C+Richelle&rft.date=2025-02-18&rft.eissn=2470-1343&rft.volume=10&rft.issue=6&rft.spage=6119&rft_id=info:doi/10.1021%2Facsomega.4c10568&rft_id=info%3Apmid%2F39989835&rft.externalDocID=39989835
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2470-1343&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2470-1343&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2470-1343&client=summon