Journal of Computer Applications ›› 2005, Vol. 25 ›› Issue (08): 1750-1752.DOI: 10.3724/SP.J.1087.2005.01750
• Network and information security • Previous Articles Next Articles
JIANG Dan1,XUAN Guo-rong1,YANG Cheng-yun1,ZHENG Yi-zhan1,LIU Lian-sheng2,BAI Wei-chao2
姜聃1,宣国荣1,杨程云1,郑伊展1,刘连生2,白维朝2