Journal of Computer Applications ›› 2005, Vol. 25 ›› Issue (08): 1747-1749.DOI: 10.3724/SP.J.1087.2005.01747
• Network and information security • Previous Articles Next Articles
TAN Li-li1,4,LIU Jing2,3,XIE Hong-bo3,TAN Xing-lie4
谭立力1,4,刘璟2,3,谢鸿波3,谭兴烈 4