APA (7th ed.) Citation

Liu, X., Chen, W., Peng, L., Luo, D., Jia, L., Xu, G., . . . Liu, X. Secure computation protocol of Chebyshev distance under the malicious model. Nature Portfolio.

Chicago Style (17th ed.) Citation

Liu, Xin, Weitong Chen, Lu Peng, Dan Luo, Likai Jia, Gang Xu, Xiubo Chen, and Xiaomeng Liu. Secure Computation Protocol of Chebyshev Distance Under the Malicious Model. Nature Portfolio.

MLA (9th ed.) Citation

Liu, Xin, et al. Secure Computation Protocol of Chebyshev Distance Under the Malicious Model. Nature Portfolio.

Warning: These citations may not always be 100% accurate.