Journal of Computer Applications ›› 2005, Vol. 25 ›› Issue (09): 2094-2097.DOI: 10.3724/SP.J.1087.2005.02094
• Network and information security • Previous Articles Next Articles
WANG Xing-wei1,2,LIU Cong1,CUI Jian-ye1,HUANG Min2
王兴伟1,2,刘聪1,崔建业1,黄敏2