APA (7th ed.) Citation

Li, P., Ma, J., Yin, L., & Ma, Q. A Construction Method of (2, 3) Visual Cryptography Scheme. IEEE.

Chicago Style (17th ed.) Citation

Li, Peng, Jianfeng Ma, Liping Yin, and Quan Ma. A Construction Method of (2, 3) Visual Cryptography Scheme. IEEE.

MLA (9th ed.) Citation

Li, Peng, et al. A Construction Method of (2, 3) Visual Cryptography Scheme. IEEE.

Warning: These citations may not always be 100% accurate.