作 者:M.A. Mohamed, M.M. Atta
出 处:International Journal of Computer Science and Network Security. 2010 ;10(2).
出 版 社:International Journal of Computer Science and Network Security
文 章 ID:47750339