LI, X., DENG, L., ZHANG, Y., & MA, J. Rational analysis of authentication protocols based on NGUYEN L H scheme. Editorial Department of Journal on Communications.
Chicago Style (17th ed.) CitationLI, Xing-hua, Ling-juan DENG, Yuan ZHANG, and Jian-feng MA. Rational Analysis of Authentication Protocols Based on NGUYEN L H Scheme. Editorial Department of Journal on Communications.
MLA (9th ed.) CitationLI, Xing-hua, et al. Rational Analysis of Authentication Protocols Based on NGUYEN L H Scheme. Editorial Department of Journal on Communications.
Warning: These citations may not always be 100% accurate.