Armstrong, H., & -. (2004). Who Has the Keys to the Vault? Protecting Secrets on Laptops. IEEE.
Chicago Style (17th ed.) CitationArmstrong, Helen, and -. Who Has the Keys to the Vault? Protecting Secrets on Laptops. IEEE, 2004.
MLA (9th ed.) CitationArmstrong, Helen, and -. Who Has the Keys to the Vault? Protecting Secrets on Laptops. IEEE, 2004.
Warning: These citations may not always be 100% accurate.