APA (7th ed.) Citation

Sulong, M. R. (2008). Key Transformation Approach for Rijndael Security.

Chicago Style (17th ed.) Citation

Sulong, Mek Rahmah. Key Transformation Approach for Rijndael Security. 2008.

MLA (8th ed.) Citation

Sulong, Mek Rahmah. Key Transformation Approach for Rijndael Security. 2008.

Warning: These citations may not always be 100% accurate.