Fig. 1From: Long-term integrity protection of genomic dataOverview of the application scenario for our protection schemeBack to article page