Journal of Computer Applications ›› 2013, Vol. 33 ›› Issue (09): 2511-2515.DOI: 10.11772/j.issn.1001-9081.2013.09.2511
• Information security • Previous Articles Next Articles
REN Zhiyu1,2,3,CHEN Xingyuan1,3,SHAN Dibin1,2,3
任志宇1,2,3,陈性元1,3,单棣斌1,2,3