Li, P., Ma, J., Yin, L., & Ma, Q. A Construction Method of (2, 3) Visual Cryptography Scheme. IEEE.
Chicago Style (17th ed.) CitationLi, Peng, Jianfeng Ma, Liping Yin, and Quan Ma. A Construction Method of (2, 3) Visual Cryptography Scheme. IEEE.
MLA (9th ed.) CitationLi, Peng, et al. A Construction Method of (2, 3) Visual Cryptography Scheme. IEEE.
Warning: These citations may not always be 100% accurate.