Return to Article Details Implementation Approach of a Dynamic Protection Scheme with Binary Key-Pair Download Download PDF