作 者:Tzung-Pei Hong ;Pei-Ying Huang, Gwoboa,Horng
出 处:International Journal of Computer Science and Network Security. 2006 ;6(3A):98-104.
出 版 社:International Journal of Computer Science and Network Security
文 章 ID:46399100