MLA
Pulkkis, Göran, et al. "Taxonomies of User-Authentication Methods in Computer Networks." Information Security and Ethics: Concepts, Methodologies, Tools, and Applications, edited by Hamid Nemati, IGI Global, 2008, pp. 737-760. https://doi.org/10.4018/978-1-59904-937-3.ch054
APA
Pulkkis, G., Grahn, K. J., & Karlsson, J. (2008). Taxonomies of User-Authentication Methods in Computer Networks. In H. Nemati (Ed.), Information Security and Ethics: Concepts, Methodologies, Tools, and Applications (pp. 737-760). IGI Global. https://doi.org/10.4018/978-1-59904-937-3.ch054
Chicago
Pulkkis, Göran, Kaj J. Grahn, and Jonny Karlsson. "Taxonomies of User-Authentication Methods in Computer Networks." In Information Security and Ethics: Concepts, Methodologies, Tools, and Applications, edited by Hamid Nemati, 737-760. Hershey, PA: IGI Global, 2008. https://doi.org/10.4018/978-1-59904-937-3.ch054
Export Reference