APA (7th ed.) Citation

Ren, W., Yu, L., Ma, L., & Ren, Y. How to Authenticate a Device? Formal Authentication Models for M2M Communications Defending against Ghost Compromising Attack. Wiley.

Chicago Style (17th ed.) Citation

Ren, Wei, Linchen Yu, Liangli Ma, and Yi Ren. How to Authenticate a Device? Formal Authentication Models for M2M Communications Defending Against Ghost Compromising Attack. Wiley.

MLA (9th ed.) Citation

Ren, Wei, et al. How to Authenticate a Device? Formal Authentication Models for M2M Communications Defending Against Ghost Compromising Attack. Wiley.

Warning: These citations may not always be 100% accurate.