[1]
F. Hartanto, B. Budiman, E. Gwei, A. A. S. Gunawan, and I. S. Edbert, “An Experiment to Prevent Malicious Actors from Compromising Private Digital Assets Over a Public Network”, EMACS Journal, vol. 6, no. 1, pp. 7–11, Jan. 2024.