MLA
Torres, Jenny, et al. "Identity-Based Cryptography: Applications, Vulnerabilities, and Future Directions." IT Policy and Ethics: Concepts, Methodologies, Tools, and Applications, edited by Information Resources Management Association, IGI Global, 2013, pp. 430-450. https://doi.org/10.4018/978-1-4666-2919-6.ch020
APA
Torres, J., Nogueira, M., & Pujolle, G. (2013). Identity-Based Cryptography: Applications, Vulnerabilities, and Future Directions. In I. Management Association (Ed.), IT Policy and Ethics: Concepts, Methodologies, Tools, and Applications (pp. 430-450). IGI Global. https://doi.org/10.4018/978-1-4666-2919-6.ch020
Chicago
Torres, Jenny, Michele Nogueira, and Guy Pujolle. "Identity-Based Cryptography: Applications, Vulnerabilities, and Future Directions." In IT Policy and Ethics: Concepts, Methodologies, Tools, and Applications, edited by Information Resources Management Association, 430-450. Hershey, PA: IGI Global, 2013. https://doi.org/10.4018/978-1-4666-2919-6.ch020
Export Reference