APA (7th ed.) Citation

Mitchell, C. J. How not to secure wireless sensor networks: A plethora of insecure polynomial‐based key pre‐distribution schemes. Wiley.

Chicago Style (17th ed.) Citation

Mitchell, Chris J. How Not to Secure Wireless Sensor Networks: A Plethora of Insecure Polynomial‐based Key Pre‐distribution Schemes. Wiley.

MLA (9th ed.) Citation

Mitchell, Chris J. How Not to Secure Wireless Sensor Networks: A Plethora of Insecure Polynomial‐based Key Pre‐distribution Schemes. Wiley.

Warning: These citations may not always be 100% accurate.