APA (7th ed.) Citation

Ahn, J., Hussain, R., Kang, K., & Son, J. (2025). Exploring Encryption Algorithms and Network Protocols: A Comprehensive Survey of Threats and Vulnerabilities. IEEE Communications surveys and tutorials, 1. https://doi.org/10.1109/COMST.2025.3526605

Chicago Style (17th ed.) Citation

Ahn, Jemin, Rasheed Hussain, Kyungtae Kang, and Junggab Son. "Exploring Encryption Algorithms and Network Protocols: A Comprehensive Survey of Threats and Vulnerabilities." IEEE Communications Surveys and Tutorials 2025: 1. https://doi.org/10.1109/COMST.2025.3526605.

MLA (9th ed.) Citation

Ahn, Jemin, et al. "Exploring Encryption Algorithms and Network Protocols: A Comprehensive Survey of Threats and Vulnerabilities." IEEE Communications Surveys and Tutorials, 2025, p. 1, https://doi.org/10.1109/COMST.2025.3526605.

Warning: These citations may not always be 100% accurate.