MLA
King, Brian and Yvo Desmedt. "Securing an Electronic Legislature Using Threshold Signatures." Information Security and Ethics: Concepts, Methodologies, Tools, and Applications, edited by Hamid Nemati, IGI Global, 2008, pp. 1176-1183. http://doi:10.4018/978-1-59904-937-3.ch081
APA
King, B., & Desmedt, Y. (2008). Securing an Electronic Legislature Using Threshold Signatures. In Nemati, H. (Ed.), Information Security and Ethics: Concepts, Methodologies, Tools, and Applications (pp. 1176-1183). IGI Global. http://doi:10.4018/978-1-59904-937-3.ch081
Chicago
King, Brian, and Yvo Desmedt. "Securing an Electronic Legislature Using Threshold Signatures." In Information Security and Ethics: Concepts, Methodologies, Tools, and Applications. edited by Hamid Nemati, 1176-1183. Hershey, PA: IGI Global, 2008. http://doi:10.4018/978-1-59904-937-3.ch081
Export Reference
