Sulong, M. R. (2008). Key Transformation Approach for Rijndael Security.
Chicago Style (17th ed.) CitationSulong, Mek Rahmah. Key Transformation Approach for Rijndael Security. 2008.
MLA (9th ed.) CitationSulong, Mek Rahmah. Key Transformation Approach for Rijndael Security. 2008.
Warning: These citations may not always be 100% accurate.