Journal of Computer Applications ›› 2013, Vol. 33 ›› Issue (06): 1615-1618.DOI: 10.3724/SP.J.1087.2013.01615

• Information security • Previous Articles     Next Articles

  

  • Received:2012-11-13 Revised:2013-01-09 Online:2013-06-01 Published:2013-06-05
  • Contact: ZHANG Sijie

CLC Number: