Crampton, J., Farley, N., Gutin, G., & Jones, M. (2015). Optimal Constructions for Chain-Based Cryptographic Enforcement of Information Flow Policies. Data and Applications Security and Privacy XXIX, 9149, 330-345. https://doi.org/10.1007/978-3-319-20810-7_23
Chicago Style (17th ed.) CitationCrampton, Jason, Naomi Farley, Gregory Gutin, and Mark Jones. "Optimal Constructions for Chain-Based Cryptographic Enforcement of Information Flow Policies." Data and Applications Security and Privacy XXIX 9149 (2015): 330-345. https://doi.org/10.1007/978-3-319-20810-7_23.
MLA (9th ed.) CitationCrampton, Jason, et al. "Optimal Constructions for Chain-Based Cryptographic Enforcement of Information Flow Policies." Data and Applications Security and Privacy XXIX, vol. 9149, 2015, pp. 330-345, https://doi.org/10.1007/978-3-319-20810-7_23.