Journal of Computer Applications ›› 2011, Vol. 31 ›› Issue (10): 2674-2677.DOI: 10.3724/SP.J.1087.2011.02674
• Information security • Previous Articles Next Articles
YAN Bin1, WANG Xiao-ming1,2, HAO Jian-jun1, ZHANG Ren-yan1
颜斌1,王小明1,2,郝建军1,张仁彦1