APA (7th ed.) Citation

Shin, D., Sahama, T., Kim, S. J., & Kim, J. (2011). The Scalability and the Strategy for EMR Database Encryption Techniques. Journal of Information and Communication Convergence Engineering, 9(5), 9(5), 577-582. https://doi.org/10.6109/jicce.2011.9.5.577

Chicago Style (17th ed.) Citation

Shin, David, Tony Sahama, Steve Jung-Tae Kim, and Ji-Hong Kim. "The Scalability and the Strategy for EMR Database Encryption Techniques." Journal of Information and Communication Convergence Engineering, 9(5) 9, no. 5 (2011): 577-582. https://doi.org/10.6109/jicce.2011.9.5.577.

MLA (9th ed.) Citation

Shin, David, et al. "The Scalability and the Strategy for EMR Database Encryption Techniques." Journal of Information and Communication Convergence Engineering, 9(5), vol. 9, no. 5, 2011, pp. 577-582, https://doi.org/10.6109/jicce.2011.9.5.577.

Warning: These citations may not always be 100% accurate.