Author: Gao Haichang Ma Licheng Jia Wei Ye Fei
Publisher: Inderscience Publishers
ISSN: 1744-1765
Source: International Journal of Information and Computer Security, Vol.5, Iss.1, 2012-12, pp. : 11-27
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Abstract