Author(s): |
Xiao-zhong Pan, Key Laboratory of Network & Information Security under the Chinese Armed Police Force,Department of Electronic Technology, Engineering,University of Armed Policed Force,Xi’an, China Ting-ting Su, Key Laboratory of Network & Information Security under the Chinese Armed Police Force,Department of Electronic Technology, Engineering,University of Armed Policed Force,Xi’an, China |