Sorry, we do not have enough data to show an influence graph for this author.
- Full text PDF available (0)
Journals and Conferences
Following the increase requirement of data security, distribute information after encrypting, this is an effective method to keep its security during transporting period. This article introduces an… (More)