J4 ›› 2013, Vol. 48 ›› Issue (7): 39-45.
• Articles • Previous Articles Next Articles
QIU Xiu-feng1,2, LIU Jian-wei1, WU Qian-hong1, LIU Jian-hua1
CLC Number:
[1] | NI Liang1,2,3, CHEN Gong-liang3, LI Jian-hua3. Security analysis of the eCK model [J]. J4, 2013, 48(7): 46-50. |
|