(2010). Reducing the computational cost of the authentication process in SET protocol.
Chicago Style (17th ed.) CitationReducing the Computational Cost of the Authentication Process in SET Protocol. 2010.
MLA (8th ed.) CitationReducing the Computational Cost of the Authentication Process in SET Protocol. 2010.
Warning: These citations may not always be 100% accurate.