Cite
Secure Modular Exponentiation Outsource With Two Untrusted Programs and Improved Checkability.
MLA
Yu-Feng Ma, et al. “Secure Modular Exponentiation Outsource With Two Untrusted Programs and Improved Checkability.” Journal of Information Science & Engineering, vol. 32, no. 5, Sept. 2016, pp. 1205–18. EBSCOhost, widgets.ebscohost.com/prod/customlink/proxify/proxify.php?count=1&encode=0&proxy=&find_1=&replace_1=&target=https://search.ebscohost.com/login.aspx?direct=true&site=eds-live&scope=site&db=edo&AN=118107137&authtype=sso&custid=ns315887.
APA
Yu-Feng Ma, Hai-Bo Tian, & Bao-Dian Wei. (2016). Secure Modular Exponentiation Outsource With Two Untrusted Programs and Improved Checkability. Journal of Information Science & Engineering, 32(5), 1205–1218.
Chicago
Yu-Feng Ma, Hai-Bo Tian, and Bao-Dian Wei. 2016. “Secure Modular Exponentiation Outsource With Two Untrusted Programs and Improved Checkability.” Journal of Information Science & Engineering 32 (5): 1205–18. http://widgets.ebscohost.com/prod/customlink/proxify/proxify.php?count=1&encode=0&proxy=&find_1=&replace_1=&target=https://search.ebscohost.com/login.aspx?direct=true&site=eds-live&scope=site&db=edo&AN=118107137&authtype=sso&custid=ns315887.