Journal of Computer Applications ›› 2011, Vol. 31 ›› Issue (08): 2162-2164.DOI: 10.3724/SP.J.1087.2011.02162
• Information security • Previous Articles Next Articles
Yu-liang WU1,Gou-xi CHEN1,2,Hong-lei SHEN1,Peng-cheng ZHANG1
伍玉良1,陈够喜1,2,沈红雷1,张鹏程1