Release Time:2019-03-12 Hits:
Indexed by: Journal Article
Date of Publication: 2014-01-01
Journal: Computer Modelling and New Technologies
Volume: 18
Issue: 12
Page Number: 209-214
Prev One:A Method for Memory Integrity Authentication based on Bloom Filter
Next One:非对称hash树存储器完整性保护方法