ZHANG Xiao-jie, WEI Hong-chun, WANG Yi-hai, LEI Zhuo-lin. C2C Transactions Strengthen the Integrity of a Security Solution[J]. Microelectronics & Computer, 2010, 27(5): 193-195,198.
Citation:
|
ZHANG Xiao-jie, WEI Hong-chun, WANG Yi-hai, LEI Zhuo-lin. C2C Transactions Strengthen the Integrity of a Security Solution[J]. Microelectronics & Computer, 2010, 27(5): 193-195,198.
|
ZHANG Xiao-jie, WEI Hong-chun, WANG Yi-hai, LEI Zhuo-lin. C2C Transactions Strengthen the Integrity of a Security Solution[J]. Microelectronics & Computer, 2010, 27(5): 193-195,198.
Citation:
|
ZHANG Xiao-jie, WEI Hong-chun, WANG Yi-hai, LEI Zhuo-lin. C2C Transactions Strengthen the Integrity of a Security Solution[J]. Microelectronics & Computer, 2010, 27(5): 193-195,198.
|