Cite
Mobile Digital Rights Management: Security Requirements and Copy Detection Mechanisms.
MLA
Soriano, M., et al. “Mobile Digital Rights Management: Security Requirements and Copy Detection Mechanisms.” 16th International Workshop on Database & Expert Systems Applications (DEXA’05), Jan. 2005, pp. 251–56. EBSCOhost, https://doi.org/10.1109/DEXA.2005.135.
APA
Soriano, M., Flake, S., Tacken, J., Bormann, F., & Tomas, J. (2005). Mobile Digital Rights Management: Security Requirements and Copy Detection Mechanisms. 16th International Workshop on Database & Expert Systems Applications (DEXA’05), 251–256. https://doi.org/10.1109/DEXA.2005.135
Chicago
Soriano, M., S. Flake, J. Tacken, F. Bormann, and J. Tomas. 2005. “Mobile Digital Rights Management: Security Requirements and Copy Detection Mechanisms.” 16th International Workshop on Database & Expert Systems Applications (DEXA’05), January, 251–56. doi:10.1109/DEXA.2005.135.