Skip Nav Destination
1-1 of 1
Article Type: Research Papers
J. Comput. Inf. Sci. Eng. August 2021, 21(4): 041007.
Paper No: JCISE-20-1220
Published Online: February 23, 2021
... and intellectual property theft. To effectively secure the G-code against these two attacks, a new methodology is developed in this study, which consists of a novel blockchain-based data storage approach and an effective asymmetry encryption technique. The proposed method was also applied to a real-world AM case...