Liu, A., Zhengy, K., Liz, L., Liu, G., Zhao, L., & Zhou, X. (2015, April). Efficient secure similarity computation on encrypted trajectory data. 2015 IEEE 31st International Conference on Data Engineering, 66-77. https://doi.org/10.1109/ICDE.2015.7113273
Chicago Style (17th ed.) CitationLiu, An, Kai Zhengy, Lu Liz, Guanfeng Liu, Lei Zhao, and Xiaofang Zhou. "Efficient Secure Similarity Computation on Encrypted Trajectory Data." 2015 IEEE 31st International Conference on Data Engineering Apr. 2015: 66-77. https://doi.org/10.1109/ICDE.2015.7113273.
MLA (9th ed.) CitationLiu, An, et al. "Efficient Secure Similarity Computation on Encrypted Trajectory Data." 2015 IEEE 31st International Conference on Data Engineering, Apr. 2015, pp. 66-77, https://doi.org/10.1109/ICDE.2015.7113273.