APA (7th ed.) Citation

Liu, A., Zhengy, K., Liz, L., Liu, G., Zhao, L., & Zhou, X. (2015, April). Efficient secure similarity computation on encrypted trajectory data. 2015 IEEE 31st International Conference on Data Engineering, 66-77. https://doi.org/10.1109/ICDE.2015.7113273

Chicago Style (17th ed.) Citation

Liu, An, Kai Zhengy, Lu Liz, Guanfeng Liu, Lei Zhao, and Xiaofang Zhou. "Efficient Secure Similarity Computation on Encrypted Trajectory Data." 2015 IEEE 31st International Conference on Data Engineering Apr. 2015: 66-77. https://doi.org/10.1109/ICDE.2015.7113273.

MLA (9th ed.) Citation

Liu, An, et al. "Efficient Secure Similarity Computation on Encrypted Trajectory Data." 2015 IEEE 31st International Conference on Data Engineering, Apr. 2015, pp. 66-77, https://doi.org/10.1109/ICDE.2015.7113273.

Warning: These citations may not always be 100% accurate.