Ahn, J., Hussain, R., Kang, K., & Son, J. (2025). Exploring Encryption Algorithms and Network Protocols: A Comprehensive Survey of Threats and Vulnerabilities. IEEE Communications surveys and tutorials, 1. https://doi.org/10.1109/COMST.2025.3526605
Citace podle Chicago (17th ed.)Ahn, Jemin, Rasheed Hussain, Kyungtae Kang, a Junggab Son. "Exploring Encryption Algorithms and Network Protocols: A Comprehensive Survey of Threats and Vulnerabilities." IEEE Communications Surveys and Tutorials 2025: 1. https://doi.org/10.1109/COMST.2025.3526605.
Citace podle MLA (9th ed.)Ahn, Jemin, et al. "Exploring Encryption Algorithms and Network Protocols: A Comprehensive Survey of Threats and Vulnerabilities." IEEE Communications Surveys and Tutorials, 2025, p. 1, https://doi.org/10.1109/COMST.2025.3526605.