MLA
Mulkey, Clifton, et al. "An Efficient Protocol for Privacy and Authentication for Resource-Constrained Devices in Wireless Networks." IJCWT vol.3, no.2 2013: pp.38-57. http://doi.org/10.4018/ijcwt.2013040103
APA
Mulkey, C., Kar, D., & Katangur, A. (2013). An Efficient Protocol for Privacy and Authentication for Resource-Constrained Devices in Wireless Networks. International Journal of Cyber Warfare and Terrorism (IJCWT), 3(2), 38-57. http://doi.org/10.4018/ijcwt.2013040103
Chicago
Mulkey, Clifton, Dulal Kar, and Ajay Katangur. "An Efficient Protocol for Privacy and Authentication for Resource-Constrained Devices in Wireless Networks," International Journal of Cyber Warfare and Terrorism (IJCWT) 3, no.2: 38-57. http://doi.org/10.4018/ijcwt.2013040103
Export Reference