Citation Formats
Security Analysis of Mobile Authenticator Applications
  • IEEE
  • ACM
  • APA
  • Chicago
  • MLA
  • Harvard
  • BibTeX

C. Ozkan And K. Bicakci, "Security Analysis of Mobile Authenticator Applications," International Conference on Information Security and Cryptology (ISCTURKEY) , ELECTR NETWORK, pp.18-30, 2020

Ozkan, C. And Bicakci, K. 2020. Security Analysis of Mobile Authenticator Applications. International Conference on Information Security and Cryptology (ISCTURKEY) , (ELECTR NETWORK), 18-30.

Ozkan, C., & Bicakci, K., (2020). Security Analysis of Mobile Authenticator Applications . International Conference on Information Security and Cryptology (ISCTURKEY) (pp.18-30). , ELECTR NETWORK

Ozkan, Can, And Kemal Bıçakcı. "Security Analysis of Mobile Authenticator Applications," International Conference on Information Security and Cryptology (ISCTURKEY), ELECTR NETWORK, 2020

Ozkan, Can And Bicakci, Kemal. "Security Analysis of Mobile Authenticator Applications." International Conference on Information Security and Cryptology (ISCTURKEY) , ELECTR NETWORK, pp.18-30, 2020

Ozkan, C. And Bicakci, K. (2020) . "Security Analysis of Mobile Authenticator Applications." International Conference on Information Security and Cryptology (ISCTURKEY) , ELECTR NETWORK, pp.18-30.

@conferencepaper{conferencepaper, author={Can Ozkan And author={Kemal Bıçakcı}, title={Security Analysis of Mobile Authenticator Applications}, congress name={International Conference on Information Security and Cryptology (ISCTURKEY)}, city={}, country={ELECTR NETWORK}, year={2020}, pages={18-30} }