Computer Engineering and Applications ›› 2009, Vol. 45 ›› Issue (4): 126-129.DOI: 10.3778/j.issn.1002-8331.2009.04.035
• 网络、通信、安全 • Previous Articles Next Articles
XU Yun-jian1,2,PENG Pei-fu1,GUO Ai-yin2,3,ZHANG Gui-fang2
徐云剑1,2,彭沛夫1,郭艾寅2,3,张桂芳2