Peng1, X., Guo-hua1, C., & Ming-hui2, Z. Efficiently non-authenticated group key management protocol withstand interruption attack. Editorial Department of Journal on Communications.
Chicago Style (17th ed.) CitationPeng1, XU, CUI Guo-hua1, and ZHENG Ming-hui2. Efficiently Non-authenticated Group Key Management Protocol Withstand Interruption Attack. Editorial Department of Journal on Communications.
MLA (9th ed.) CitationPeng1, XU, et al. Efficiently Non-authenticated Group Key Management Protocol Withstand Interruption Attack. Editorial Department of Journal on Communications.
Warning: These citations may not always be 100% accurate.