Journal of Computer Applications ›› 2005, Vol. 25 ›› Issue (04): 839-841.DOI: 10.3724/SP.J.1087.2005.0839
• Information security • Previous Articles Next Articles
GAO Tie-gang1,2,CHEN Zeng-qiang 1,YUAN Zhu-zhi1,GU Qiao-lun1
高铁杠1,2,陈增强1,袁著祉1,顾巧论1