Return to Article Details ASTUDYONCRYPTOGRAPHYFORINTRINSICAUTHENTICATIONAPPLICATIONS Download Download PDF