Sulong, M. R. (2008). Key Transformation Approach for Rijndael Security.
Chicago Style (17th ed.) CitationSulong, Mek Rahmah. Key Transformation Approach for Rijndael Security. 2008.
MLA引文Sulong, Mek Rahmah. Key Transformation Approach for Rijndael Security. 2008.
警告:這些引文格式不一定是100%准確.