MLA
Al-Jaljouli, Raja, and Jemal H. Abawajy. "Mobile Agents Security Protocols." Mobile Computing Techniques in Emerging Markets: Systems, Applications and Services, edited by A.V. Senthil Kumar and Hakikur Rahman, IGI Global, 2012, pp. 270-305. https://doi.org/10.4018/978-1-4666-0080-5.ch010
APA
Al-Jaljouli, R. & Abawajy, J. H. (2012). Mobile Agents Security Protocols. In A. Kumar & H. Rahman (Eds.), Mobile Computing Techniques in Emerging Markets: Systems, Applications and Services (pp. 270-305). IGI Global. https://doi.org/10.4018/978-1-4666-0080-5.ch010
Chicago
Al-Jaljouli, Raja, and Jemal H. Abawajy. "Mobile Agents Security Protocols." In Mobile Computing Techniques in Emerging Markets: Systems, Applications and Services, edited by A.V. Senthil Kumar and Hakikur Rahman, 270-305. Hershey, PA: IGI Global, 2012. https://doi.org/10.4018/978-1-4666-0080-5.ch010
Export Reference