APA (7th ed.) Citation

Li, J., Yu, Q., Zhang, Y., & Shen, J. (2019). Key-policy attribute-based encryption against continual auxiliary input leakage. Information sciences, 470, 175-188. https://doi.org/10.1016/j.ins.2018.07.077

Chicago Style (17th ed.) Citation

Li, Jiguo, Qihong Yu, Yichen Zhang, and Jian Shen. "Key-policy Attribute-based Encryption Against Continual Auxiliary Input Leakage." Information Sciences 470 (2019): 175-188. https://doi.org/10.1016/j.ins.2018.07.077.

MLA (9th ed.) Citation

Li, Jiguo, et al. "Key-policy Attribute-based Encryption Against Continual Auxiliary Input Leakage." Information Sciences, vol. 470, 2019, pp. 175-188, https://doi.org/10.1016/j.ins.2018.07.077.

Warning: These citations may not always be 100% accurate.