Hits:
Indexed by:会议论文
Date of Publication:2009-01-01
Page Number:158-173
Pre One:An Improvement of Proxy Certificate Chain Authentication Scheme Based on Proxy Certificate Trust List
Next One:A sudoku based wet paper hiding scheme