SEARCH Articles Figures Tables Deprotection methods Functionalization methods protection-deprotection approaches Protection -deprotection