Ahn, J., Hussain, R., Kang, K., & Son, J. (2025). Exploring Encryption Algorithms and Network Protocols: A Comprehensive Survey of Threats and Vulnerabilities. IEEE Communications surveys and tutorials, 1. https://doi.org/10.1109/COMST.2025.3526605
Chicago-Zitierstil (17. Ausg.)Ahn, Jemin, Rasheed Hussain, Kyungtae Kang, und Junggab Son. "Exploring Encryption Algorithms and Network Protocols: A Comprehensive Survey of Threats and Vulnerabilities." IEEE Communications Surveys and Tutorials 2025: 1. https://doi.org/10.1109/COMST.2025.3526605.
MLA-Zitierstil (9. Ausg.)Ahn, Jemin, et al. "Exploring Encryption Algorithms and Network Protocols: A Comprehensive Survey of Threats and Vulnerabilities." IEEE Communications Surveys and Tutorials, 2025, p. 1, https://doi.org/10.1109/COMST.2025.3526605.