Hits:
Indexed by:期刊论文
Date of Publication:2014-01-01
Journal:Computer Modelling and New Technologies
Volume:18
Issue:12
Page Number:209-214
Pre One:A Method for Memory Integrity Authentication based on Bloom Filter
Next One:非对称hash树存储器完整性保护方法