Utilizing Encryption Keys Derived from Immunoaffinity Interactions as a Basis for Potential Security Enhancements
Bioaffinity interactions allow antibodies and antigens to bind and were shown to successfully produce cryptographic keys for encryption in this research. This straightforward immune-system-based construct has shown that data obtained from immunoassay interactions may be utilized to create symmetrica...
Saved in:
Published in | ACS omega Vol. 10; no. 6; pp. 6119 - 6123 |
---|---|
Main Authors | , , , , , |
Format | Journal Article |
Language | English |
Published |
United States
American Chemical Society
18.02.2025
|
Online Access | Get full text |
ISSN | 2470-1343 2470-1343 |
DOI | 10.1021/acsomega.4c10568 |
Cover
Abstract | Bioaffinity interactions allow antibodies and antigens to bind and were shown to successfully produce cryptographic keys for encryption in this research. This straightforward immune-system-based construct has shown that data obtained from immunoassay interactions may be utilized to create symmetrical key ciphers. The Advanced Encryption Standard (AES), the current standard method to encrypt and decrypt data, was implemented to show that biomolecules from immune systems can be applied to cryptography for security enhancements. When the sender and receiver use identical protocols and component concentrations, the symmetrical key ciphers can be encrypted and decrypted. Variable immunoassay concentrations, pH, temperature, and data point sorting protocols applied to encryption systems will prevent key repetition and alleviate the ability for unauthorized system access, which solves prominent issues in cryptography. This concept can also strengthen cryptographic processes by providing additional security levels of varying complexity using other indirect methods with this nontraditional immunoaffinity approach to current cipher algorithms. |
---|---|
AbstractList | Bioaffinity interactions allow antibodies and antigens to bind and were shown to successfully produce cryptographic keys for encryption in this research. This straightforward immune-system-based construct has shown that data obtained from immunoassay interactions may be utilized to create symmetrical key ciphers. The Advanced Encryption Standard (AES), the current standard method to encrypt and decrypt data, was implemented to show that biomolecules from immune systems can be applied to cryptography for security enhancements. When the sender and receiver use identical protocols and component concentrations, the symmetrical key ciphers can be encrypted and decrypted. Variable immunoassay concentrations, pH, temperature, and data point sorting protocols applied to encryption systems will prevent key repetition and alleviate the ability for unauthorized system access, which solves prominent issues in cryptography. This concept can also strengthen cryptographic processes by providing additional security levels of varying complexity using other indirect methods with this nontraditional immunoaffinity approach to current cipher algorithms. Bioaffinity interactions allow antibodies and antigens to bind and were shown to successfully produce cryptographic keys for encryption in this research. This straightforward immune-system-based construct has shown that data obtained from immunoassay interactions may be utilized to create symmetrical key ciphers. The Advanced Encryption Standard (AES), the current standard method to encrypt and decrypt data, was implemented to show that biomolecules from immune systems can be applied to cryptography for security enhancements. When the sender and receiver use identical protocols and component concentrations, the symmetrical key ciphers can be encrypted and decrypted. Variable immunoassay concentrations, pH, temperature, and data point sorting protocols applied to encryption systems will prevent key repetition and alleviate the ability for unauthorized system access, which solves prominent issues in cryptography. This concept can also strengthen cryptographic processes by providing additional security levels of varying complexity using other indirect methods with this nontraditional immunoaffinity approach to current cipher algorithms. Bioaffinity interactions allow antibodies and antigens to bind and were shown to successfully produce cryptographic keys for encryption in this research. This straightforward immune-system-based construct has shown that data obtained from immunoassay interactions may be utilized to create symmetrical key ciphers. The Advanced Encryption Standard (AES), the current standard method to encrypt and decrypt data, was implemented to show that biomolecules from immune systems can be applied to cryptography for security enhancements. When the sender and receiver use identical protocols and component concentrations, the symmetrical key ciphers can be encrypted and decrypted. Variable immunoassay concentrations, pH, temperature, and data point sorting protocols applied to encryption systems will prevent key repetition and alleviate the ability for unauthorized system access, which solves prominent issues in cryptography. This concept can also strengthen cryptographic processes by providing additional security levels of varying complexity using other indirect methods with this nontraditional immunoaffinity approach to current cipher algorithms.Bioaffinity interactions allow antibodies and antigens to bind and were shown to successfully produce cryptographic keys for encryption in this research. This straightforward immune-system-based construct has shown that data obtained from immunoassay interactions may be utilized to create symmetrical key ciphers. The Advanced Encryption Standard (AES), the current standard method to encrypt and decrypt data, was implemented to show that biomolecules from immune systems can be applied to cryptography for security enhancements. When the sender and receiver use identical protocols and component concentrations, the symmetrical key ciphers can be encrypted and decrypted. Variable immunoassay concentrations, pH, temperature, and data point sorting protocols applied to encryption systems will prevent key repetition and alleviate the ability for unauthorized system access, which solves prominent issues in cryptography. This concept can also strengthen cryptographic processes by providing additional security levels of varying complexity using other indirect methods with this nontraditional immunoaffinity approach to current cipher algorithms. |
Author | Newland, Ashley Halámek, Jan Manson, Richelle Cowley, Abby Halámková, Lenka Morales, Jaleigh |
AuthorAffiliation | Texas Tech University Department of Environmental Toxicology, The Institute for Forensic Science |
AuthorAffiliation_xml | – name: Texas Tech University – name: Department of Environmental Toxicology, The Institute for Forensic Science |
Author_xml | – sequence: 1 givenname: Abby surname: Cowley fullname: Cowley, Abby – sequence: 2 givenname: Ashley surname: Newland fullname: Newland, Ashley – sequence: 3 givenname: Lenka surname: Halámková fullname: Halámková, Lenka – sequence: 4 givenname: Richelle surname: Manson fullname: Manson, Richelle – sequence: 5 givenname: Jaleigh surname: Morales fullname: Morales, Jaleigh – sequence: 6 givenname: Jan orcidid: 0000-0002-2085-5730 surname: Halámek fullname: Halámek, Jan email: jan.halamek@ttu.edu |
BackLink | https://www.ncbi.nlm.nih.gov/pubmed/39989835$$D View this record in MEDLINE/PubMed |
BookMark | eNqNUcFu1DAQjVARLaV3TshHDmyxHcfrnBCUBVZUAqlwtibOeOtVYm_tpCh8PV6yrdoDEtJItt68eW9G73lx5IPHonjJ6DmjnL0Fk0KPGzgXhtFKqifFCRdLumClKI8e_I-Ls5S2lFImFVdcPiuOy7pWtSqrk-Lm5-A699v5DVl5E6fd4IInX3FK5CNGd4stsTH0ZN33ow9grfNumMjaDxjB7MmJQC7yAZJLxIZIvocB_eCgI1doxrinr_w1eIN9xtOL4qmFLuHZ4T0trj6tflx8WVx--7y-eH-5AFGVw4IrpritOW-5pFZWSkmsG6XqqkWRYbBcClBCtkahoI1A1Yh6WUoum5aXp8V6Vm0DbPUuuh7ipAM4_RcIcaMhDs50qNmSQ0N5ZUUua8oGLBjJ0SqODFFlLTZrjX4H0y_ountBRvU-C32XhT5kkWfezTO7semxNfnyCN2jRR53vLvWm3CrGVOCVnWVFV4fFGK4GTENunfJYNeBxzAmXbIl5dlJ1pn66qHZvctdzJlAZ4KJIaWI9n8OeDOP5I7ehjH6HNa_6X8Ae0_O0Q |
Cites_doi | 10.1016/0731-7085(87)80077-8 10.1021/acssynbio.9b00164 10.1038/ncomms11374 10.1038/21092 10.1016/j.snb.2013.06.050 10.1109/ICICES.2013.6508181 10.1002/bit.23017 10.1016/j.biosystems.2017.07.002 10.1016/0731-7085(89)80079-2 10.1142/7968 10.1002/anie.201107156 10.1373/clinchem.2005.051532 10.1016/0014-5793(71)80319-8 10.48550/arXiv.0912.4710 |
ContentType | Journal Article |
Copyright | 2025 The Authors. Published by American Chemical Society 2025 The Authors. Published by American Chemical Society. 2025 The Authors. Published by American Chemical Society 2025 The Authors |
Copyright_xml | – notice: 2025 The Authors. Published by American Chemical Society – notice: 2025 The Authors. Published by American Chemical Society. – notice: 2025 The Authors. Published by American Chemical Society 2025 The Authors |
DBID | N~. AAYXX CITATION NPM 7X8 5PM ADTOC UNPAY DOA |
DOI | 10.1021/acsomega.4c10568 |
DatabaseName | American Chemical Society (ACS) Open Access CrossRef PubMed MEDLINE - Academic PubMed Central (Full Participant titles) Unpaywall for CDI: Periodical Content Unpaywall DOAJ Directory of Open Access Journals |
DatabaseTitle | CrossRef PubMed MEDLINE - Academic |
DatabaseTitleList | PubMed MEDLINE - Academic |
Database_xml | – sequence: 1 dbid: N~. name: American Chemical Society (ACS) Open Access url: https://pubs.acs.org sourceTypes: Publisher – sequence: 2 dbid: DOA name: DOAJ Directory of Open Access Journals url: https://www.doaj.org/ sourceTypes: Open Website – sequence: 3 dbid: NPM name: PubMed url: https://proxy.k.utb.cz/login?url=http://www.ncbi.nlm.nih.gov/entrez/query.fcgi?db=PubMed sourceTypes: Index Database |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Chemistry |
EISSN | 2470-1343 |
EndPage | 6123 |
ExternalDocumentID | oai_doaj_org_article_172ab025f45f4fc3bafac62ef82e1ee8 10.1021/acsomega.4c10568 PMC11840595 39989835 10_1021_acsomega_4c10568 c631217257 |
Genre | Journal Article |
GroupedDBID | 53G AAFWJ AAHBH ABUCX ACS ADBBV ADUCK AFEFF AFPKN ALMA_UNASSIGNED_HOLDINGS AOIJS BCNDV EBS GROUPED_DOAJ HYE M~E N~. OK1 RPM VF5 AAYXX ABBLG CITATION NPM 7X8 5PM ADTOC EJD ROL UNPAY |
ID | FETCH-LOGICAL-a453t-28182f922d260f65886e9b8895de4922af264a846dc8e40b4e8b4973626bd23 |
IEDL.DBID | ACS |
ISSN | 2470-1343 |
IngestDate | Wed Aug 27 01:32:55 EDT 2025 Sun Sep 07 11:22:11 EDT 2025 Thu Aug 21 18:28:12 EDT 2025 Wed Oct 01 13:34:39 EDT 2025 Wed Feb 26 08:31:35 EST 2025 Tue Jul 01 05:29:08 EDT 2025 Wed Feb 19 03:11:15 EST 2025 |
IsDoiOpenAccess | true |
IsOpenAccess | true |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 6 |
Language | English |
License | https://creativecommons.org/licenses/by-nc-nd/4.0 2025 The Authors. Published by American Chemical Society. Permits non-commercial access and re-use, provided that author attribution and integrity are maintained; but does not permit creation of adaptations or other derivative works (https://creativecommons.org/licenses/by-nc-nd/4.0/). |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-a453t-28182f922d260f65886e9b8895de4922af264a846dc8e40b4e8b4973626bd23 |
Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 23 |
ORCID | 0000-0002-2085-5730 |
OpenAccessLink | https://proxy.k.utb.cz/login?url=http://dx.doi.org/10.1021/acsomega.4c10568 |
PMID | 39989835 |
PQID | 3170268369 |
PQPubID | 23479 |
PageCount | 5 |
ParticipantIDs | doaj_primary_oai_doaj_org_article_172ab025f45f4fc3bafac62ef82e1ee8 unpaywall_primary_10_1021_acsomega_4c10568 pubmedcentral_primary_oai_pubmedcentral_nih_gov_11840595 proquest_miscellaneous_3170268369 pubmed_primary_39989835 crossref_primary_10_1021_acsomega_4c10568 acs_journals_10_1021_acsomega_4c10568 |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | 2025-Feb-18 |
PublicationDateYYYYMMDD | 2025-02-18 |
PublicationDate_xml | – month: 02 year: 2025 text: 2025-Feb-18 day: 18 |
PublicationDecade | 2020 |
PublicationPlace | United States |
PublicationPlace_xml | – name: United States |
PublicationTitle | ACS omega |
PublicationTitleAlternate | ACS Omega |
PublicationYear | 2025 |
Publisher | American Chemical Society |
Publisher_xml | – name: American Chemical Society |
References | ref9/cit9 ref17/cit17 ref6/cit6 Mandge T. (ref15/cit15) 2013 ref18/cit18 Tanenbaum A. S. (ref4/cit4) 2011 ref19/cit19 ref21/cit21 ref11/cit11 ref12/cit12 ref16/cit16 ref22/cit22 ref23/cit23 Kaufman C. (ref3/cit3) 2002 ref13/cit13 ref14/cit14 ref8/cit8 Adamatzky A. (ref10/cit10) 2012 ref5/cit5 ref1/cit1 Schneier B. (ref2/cit2) 2000 ref24/cit24 ref20/cit20 ref7/cit7 |
References_xml | – ident: ref21/cit21 doi: 10.1016/0731-7085(87)80077-8 – ident: ref23/cit23 – ident: ref12/cit12 doi: 10.1021/acssynbio.9b00164 – ident: ref14/cit14 – ident: ref18/cit18 doi: 10.1038/ncomms11374 – ident: ref17/cit17 doi: 10.1038/21092 – ident: ref9/cit9 doi: 10.1016/j.snb.2013.06.050 – volume-title: Network Security Private Communication in a Public World year: 2002 ident: ref3/cit3 – start-page: 47 volume-title: 2013 International Conference on Information Communication and Embedded Systems (ICICES) year: 2013 ident: ref15/cit15 doi: 10.1109/ICICES.2013.6508181 – ident: ref1/cit1 doi: 10.1002/bit.23017 – ident: ref5/cit5 – volume-title: Computer Networks year: 2011 ident: ref4/cit4 – ident: ref24/cit24 – volume-title: Secrets and Lies: Digital Security in a Networked World year: 2000 ident: ref2/cit2 – ident: ref16/cit16 doi: 10.1016/j.biosystems.2017.07.002 – ident: ref6/cit6 – ident: ref22/cit22 doi: 10.1016/0731-7085(89)80079-2 – ident: ref7/cit7 – ident: ref8/cit8 doi: 10.1142/7968 – volume-title: Handbook of Natural Computing year: 2012 ident: ref10/cit10 – ident: ref13/cit13 doi: 10.1002/anie.201107156 – ident: ref20/cit20 doi: 10.1373/clinchem.2005.051532 – ident: ref19/cit19 doi: 10.1016/0014-5793(71)80319-8 – ident: ref11/cit11 doi: 10.48550/arXiv.0912.4710 |
SSID | ssj0001682826 |
Score | 2.2869053 |
Snippet | Bioaffinity interactions allow antibodies and antigens to bind and were shown to successfully produce cryptographic keys for encryption in this research. This... Bioaffinity interactions allow antibodies and antigens to bind and were shown to successfully produce cryptographic keys for encryption in this research. This... |
SourceID | doaj unpaywall pubmedcentral proquest pubmed crossref acs |
SourceType | Open Website Open Access Repository Aggregation Database Index Database Publisher |
StartPage | 6119 |
SummonAdditionalLinks | – databaseName: DOAJ Directory of Open Access Journals dbid: DOA link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV1Nb9QwELWqXsoFQfkKBeRKcAApdOM4WftIS6tSBEIqlXqznNimkbZJabKg7a_n2UlWuwK1FySfHCexPWPPG49nhpDXZlIm2PaLGPuAiLkWMpaQhH5dmRx4O0uDBf_L1_z4jJ-cZ-crqb78nbA-PHA_cXsQsLqAYHYcxZVpoZ0uc2adYDaxNrj5QoytKFPhdCWHJsFGuyTk2J4u2-bS_tDveemTzYfIqmW7Jo1C0P5_Ic2_L0xuzesrvfitZ7MVaXT0gNwfYCT90Hf_Idmw9TbZOhiztz0iP8-6albdQDDRw7q8XoSdgX4G3ehHMN0va6j3LKGfvH9Io52rsLYXNBwQ9r4OLdUodF-3VUsBbem3pvNXi_Db0yHpHT594bkmuMk9JqdHh98PjuMhvUKseZZ2sY8DxZxkzECncUAiIreyEEJmxnJUawewpIFPTCksnxTcioLLqY9fUxiWPiGbdVPbZ4RmUzNNpNGJmRquoZYal4JBpcikneRSROQNploNi6NVwe7NEjWSRA0kicjbkRjqqo-1cUvbfU-tZTsfJTtUgHfUwDvqLt6JyO5IawXyeFOJrm0zbxVQFZRTkeYyIk972i9_BUgnJIBrRMQaV6z1Zf1JXV2EyN2J16cziVffLRnozqE-_x9D3SH3mM9c7FPZiBdks7ue25eAU13xKqycP-DOIa4 priority: 102 providerName: Directory of Open Access Journals |
Title | Utilizing Encryption Keys Derived from Immunoaffinity Interactions as a Basis for Potential Security Enhancements |
URI | http://dx.doi.org/10.1021/acsomega.4c10568 https://www.ncbi.nlm.nih.gov/pubmed/39989835 https://www.proquest.com/docview/3170268369 https://pubmed.ncbi.nlm.nih.gov/PMC11840595 https://doi.org/10.1021/acsomega.4c10568 https://doaj.org/article/172ab025f45f4fc3bafac62ef82e1ee8 |
UnpaywallVersion | publishedVersion |
Volume | 10 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
journalDatabaseRights | – providerCode: PRVABC databaseName: American Chemical Society (ACS) Open Access customDbUrl: eissn: 2470-1343 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0001682826 issn: 2470-1343 databaseCode: N~. dateStart: 20250121 isFulltext: true titleUrlDefault: https://pubs.acs.org providerName: American Chemical Society – providerCode: PRVABC databaseName: American Chemical Society (ACS) Open Access customDbUrl: eissn: 2470-1343 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0001682826 issn: 2470-1343 databaseCode: N~. dateStart: 20160731 isFulltext: true titleUrlDefault: https://pubs.acs.org providerName: American Chemical Society – providerCode: PRVABC databaseName: American Chemical Society (ACS) Open Access customDbUrl: eissn: 2470-1343 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0001682826 issn: 2470-1343 databaseCode: N~. dateStart: 20241022 isFulltext: true titleUrlDefault: https://pubs.acs.org providerName: American Chemical Society – providerCode: PRVABC databaseName: American Chemical Society Journals customDbUrl: eissn: 2470-1343 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0001682826 issn: 2470-1343 databaseCode: ACS dateStart: 20160731 isFulltext: true titleUrlDefault: https://pubs.acs.org/action/showPublications?display=journals providerName: American Chemical Society – providerCode: PRVAON databaseName: DOAJ Directory of Open Access Journals customDbUrl: eissn: 2470-1343 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0001682826 issn: 2470-1343 databaseCode: DOA dateStart: 20160101 isFulltext: true titleUrlDefault: https://www.doaj.org/ providerName: Directory of Open Access Journals – providerCode: PRVHPJ databaseName: ROAD: Directory of Open Access Scholarly Resources customDbUrl: eissn: 2470-1343 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0001682826 issn: 2470-1343 databaseCode: M~E dateStart: 20160101 isFulltext: true titleUrlDefault: https://road.issn.org providerName: ISSN International Centre – providerCode: PRVAQN databaseName: PubMed Central customDbUrl: eissn: 2470-1343 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0001682826 issn: 2470-1343 databaseCode: RPM dateStart: 20160101 isFulltext: true titleUrlDefault: https://www.ncbi.nlm.nih.gov/pmc/ providerName: National Library of Medicine |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3Pb9MwFLZgHMZlG78LbDISHEBKVztOYh-30mmANiGVSbtZdmyziC4ZSzrUHfa38-ykHWUTTIpySFMnsT_7fc_P_h5Cb80gJzDs6wjGAR4xxUUkwBL6fmVS4NtJHCL4B4fp_hH7fJwcX8vk_B3Bp2Rb5XV1ar-rPst9lnh-Hz2gKSfe0doZjq_nU1LwHUJ2NcqyQURiFndRydsK8bYor5dsUZDsv41n3lwuuTotz9Tsl5pM_rBFe-ttUqM6SBj6JSg_-tNG9_PLmwKPd_jMDbTWUVK802LoEbpny8dodTjPBPcE_TxqiklxCUYOj8r8fBZGGfwFMIA_AoAvrMF-lwr-5PeaVMq5AsaJGQ6Tje2-iRorOPCuqosaA03GX6vGL1OCx467BHpQ9IlHYNhy9xSN90bfhvtRl6ohUiyJm8hrSlEnKDXgHzlgNTy1QnMuEmMZXFYOiJcCrmNybtlAM8s1E5nXwtGGxs_QSlmV9gXCSWYyIowiJjNMgYtrXAxgFzwRdpAK3kPvoKZk19FqGWLolMh59cmu-nro_bxp5Vmr2_GPe3d92y_u84rb4QK0j-w6sASipzQQRMfgcHmslVN5Sq3j1BJroZA3c-RIaB4fdlGlraa1BIYGji6PU9FDz1skLR4F9JALIME9xJcwtvQuy7-UxUlQASfeN08E_PXDAo7__dSXd6y-V-gh9YmOfeYb_hqtNOdTuwnsq9FbodtthbkLOB9cjeB8eNX_DcwxL5w |
linkProvider | American Chemical Society |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1Lb9QwEB6Vclgu5Q3L00hwACnLJnES-0iXVlv6EGJbqTfLjm0adUlKkwVtfz1jb7JloeIh5eQkjh-fPd9kPDMAL_UwD3HbVwHuAyygkvGAoyR060qnyLeT2Fvw9w_S8RH9cJwcr0HY-cJgI2qsqfZG_MvoAuFbLKu-mM9yQHOXLJ5dg-s-EIpjQ6PJ5W-VFFUIn2QtotkwCGMat8bJqypxIimvV0SSj9x_Fd38_dRkb1aeyfl3OZ3-JJK2b8KnZWf8SZTTwaxRg_zilziP_9XbW7DRElTyboGo27BmyjvQG3V54e7C16OmmBYXKPLIVpmfz_2eQ3YREeQ9wvmb0cT5rJAd53lSSWsL3DXmxP96XHhR1ETiRTZlXdQESTP5WDXu0BJ-dtKm08OqTxwevQPePZhsbx2OxkGbuCGQNImbwEWYiiyPIo3akkWOw1LDFWM80YZisbRIwyQyH50zQ4eKGqYoz1xkHKWj-D6sl1VpHgJJMp2FXMtQZ5pKVHi1jRH6nCXcDFPO-vAKR0q0y64W3qIehaIbPtEOXx9edzMszhZRPP7w7KaDwPI5F3_bF-AciXY5C6R9UiFdtBQvm8dKWpmnkbEsMqExWMmLDkACp8cZYWRpqlktkK-h2svilPfhwQJQy08hWWQcKXEf2ArUVtqyeqcsTnxM8NBp6gnHV98sUfnXrj76x-F7Dr3x4f6e2Ns52H0MNyKXAtnlxGFPYL05n5mnyMsa9cyvxB9V_DTG |
linkToPdf | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1Lb9QwELZKkSgXxLsLBYwEB5BSNomT2Ef6WLUUVpVKpd4sJ7bbSEuyNFnQcuC397M3WVhRAVJOTjJxMjOebzyZGUJe6WERYtnPA6wDPGCKi0DAEjq90inwdhL7CP6ncXpwyj6cJWdrJOlzYTCJBpQaH8R3Wj3VtqswEL7DeP3FnKttVriG8fwGuQk8EjvxHv_c_rW1ksKN8I3WIpYNgzBmcRegvI6IM0tFs2KWfPX-6yDnn39ObsyqqZp_V5PJb2ZpdJfc6fAkfb8QgHtkzVT3ycZu38btAfl62paT8gcsFN2visu5XyLoERhI9yB934ymLsWEHrpEkVpZW0LJ59TvFC6SHhqqcNAd1ZQNBcalx3Xr_jHCY0-67ncgfeHEx-fLPSQno_3PuwdB12chUCyJ28AVhIqsiCIN58YCkvDUiJxzkWjDMKwsUJMCUNEFN2yYM8NzJjJXyCbXUfyIrFd1ZTYJTTKdhUKrUGeaKfin2saQVMETYYap4APyGp9adlrSSB8Aj0LZs0R2LBmQNz0z5HRRdOMv1-44bi2vc-Wy_QAESHbaJ4HSVA50ZxkOW8S5sqpII2N5ZEJjQORlz2sJ9riYiapMPWsk4BW8VB6nYkAeL3i_fBSwHRdAsAPCV6RiZS6rZ6rywpfwDp1jnQjc-nYpQP981Sf_-flekFvHeyP58XB89JTcjlzDYtfBhm-R9fZyZp4BRbX5c68zV4kFGe4 |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Utilizing+Encryption+Keys+Derived+from+Immunoaffinity+Interactions+as+a+Basis+for+Potential+Security+Enhancements&rft.jtitle=ACS+omega&rft.au=Cowley%2C+Abby&rft.au=Newland%2C+Ashley&rft.au=Hal%C3%A1mkov%C3%A1%2C+Lenka&rft.au=Manson%2C+Richelle&rft.date=2025-02-18&rft.eissn=2470-1343&rft.volume=10&rft.issue=6&rft.spage=6119&rft_id=info:doi/10.1021%2Facsomega.4c10568&rft_id=info%3Apmid%2F39989835&rft.externalDocID=39989835 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2470-1343&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2470-1343&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2470-1343&client=summon |