Liu, A., Zhengy, K., Liz, L., Liu, G., Zhao, L., & Zhou, X. (2015, April). Efficient secure similarity computation on encrypted trajectory data. 2015 IEEE 31st International Conference on Data Engineering, 66-77. https://doi.org/10.1109/ICDE.2015.7113273
Citace podle Chicago (17th ed.)Liu, An, Kai Zhengy, Lu Liz, Guanfeng Liu, Lei Zhao, a Xiaofang Zhou. "Efficient Secure Similarity Computation on Encrypted Trajectory Data." 2015 IEEE 31st International Conference on Data Engineering Apr. 2015: 66-77. https://doi.org/10.1109/ICDE.2015.7113273.
Citace podle MLA (9th ed.)Liu, An, et al. "Efficient Secure Similarity Computation on Encrypted Trajectory Data." 2015 IEEE 31st International Conference on Data Engineering, Apr. 2015, pp. 66-77, https://doi.org/10.1109/ICDE.2015.7113273.