APA (7th ed.) Citation

Alléaume, R., Branciard, C., Bouda, J., Debuisschert, T., Dianati, M., Gisin, N., . . . Zeilinger, A. (2014). Using quantum key distribution for cryptographic purposes: A survey. Theoretical computer science, 560(1), 62-81. https://doi.org/10.1016/j.tcs.2014.09.018

Chicago Style (17th ed.) Citation

Alléaume, R., et al. "Using Quantum Key Distribution for Cryptographic Purposes: A Survey." Theoretical Computer Science 560, no. 1 (2014): 62-81. https://doi.org/10.1016/j.tcs.2014.09.018.

MLA (9th ed.) Citation

Alléaume, R., et al. "Using Quantum Key Distribution for Cryptographic Purposes: A Survey." Theoretical Computer Science, vol. 560, no. 1, 2014, pp. 62-81, https://doi.org/10.1016/j.tcs.2014.09.018.

Warning: These citations may not always be 100% accurate.