Shin, D., Sahama, T., Kim, S. J., & Kim, J. (2011). The Scalability and the Strategy for EMR Database Encryption Techniques. Journal of Information and Communication Convergence Engineering, 9(5), 9(5), 577-582. https://doi.org/10.6109/jicce.2011.9.5.577
Chicago Style (17th ed.) CitationShin, David, Tony Sahama, Steve Jung-Tae Kim, and Ji-Hong Kim. "The Scalability and the Strategy for EMR Database Encryption Techniques." Journal of Information and Communication Convergence Engineering, 9(5) 9, no. 5 (2011): 577-582. https://doi.org/10.6109/jicce.2011.9.5.577.
MLA (9th ed.) CitationShin, David, et al. "The Scalability and the Strategy for EMR Database Encryption Techniques." Journal of Information and Communication Convergence Engineering, 9(5), vol. 9, no. 5, 2011, pp. 577-582, https://doi.org/10.6109/jicce.2011.9.5.577.