2010 Third International
Symposium on IntelligentInformation Technology and
Security Informatics
(IITSI 2010)
Jian, China
2-4 April 2010
Editors:
Fei Yu
Haiwen Liu
Roy Ng
Xuange PengJian Shu
4 IEEE IEEE Catalog Number: CFP1007G-PRT
ISBN: 978-1-4244-6730-3
TIBAJB Hannover
Third International Symposiumon Intelligent Information
Technology and SecurityInformatics
ViMtiifMM^^
IITSI2010
Table of Contents
Message from the IITSI 2010 Symposium Chairs xvii
IITSI 2010 Organizing Committee xviii
IITSI Committee Members xix
IITSI 2010 Technical Papers
Skin Segmentation Based on Double-Models 3
Hao-kui Tang and Zhi-quan Feng
A Small World Network Based Grid Resource Discovery Mechanism 8
Weichun Huang, Min Chen, andJian Liu
Adaptive Hybrid Function Projective Synchronization for Two Different
Chaotic System with Uncertain Parameters 12
Chengrong Xie and Yuhua Xu
A Quay Crane Assignment Approach for Berth Allocation Problem
in Container Terminal 17
Zhi-Hua Hit
Performance Analysis of an Improved Single Neuron Adaptive PID Control 22
Wu Wang and Zheng-min Bai
A Mixture Conjugate Gradient Method for Unconstrained Optimization 26
Hailin Liu
Distributed Key Management Scheme for Large Scale Pay-TV Application 30
Jia-Yin Tian, Cheng Yang, Yi-chun Zhang, andJian-Bo Liu
SECTrust: A Secure and Effective Distributed P2P Trust Model 34
Jianli Hu, Xiaohua Li, Bin Zhou, and Yonghua Li
v
Representing Non-deterministic Actions within the Situation Calculus
for Autonomous Characters 39
Xiangyang Huang, Xiao Xin, and Wenjun Wu
Study on Service Selections Based on Ontology and Qos 43
Wang Gang and Yin Fengxia
On the Way to Design an Optical Camera Lens for River Sediment
in Underwater Imaging 48
Xu-yan Zhou, Bing Tan, BingZhu, Xuan-ge Peng, and Xue-mou Liu
Research on MAC Communication Mechanism of Air-to-Ground Data Link
Based on 3G: The MSDU Frame Subsection and RTS/CTS Handshake
Mechanism 54
Minghui Li, Jingbo Xia, and Yaoguo Wang
The Application Research of Wireless Sensor Network in the Prison
Monitoring System 58
Wan Zhou, ZhangXuehua, XiongXin, and WuJiande
Research on k-means Clustering Algorithm: An Improved k-means Clustering
Algorithm 63
Shi Na, Liu Xumin, and Guan Yong
A Verifiable Copyright-Proving Scheme Based on Lifting Wavelet
Transformation 68
Li Lizong, Gao Tiegang, Git Qiaohtn, and Bi Lei
Design and Implementation for Real-Time Property of Serial Communication
Based on WINDOWS CE 73
YuXiang Jiang, Cheng Xu, LaLu Zhang, and ShanQin Wang
Design of Panoramic Mosaic Surveillance Platform in Severe Circumstance 77
Yu Liu, Jimchan Du, andFeng Ji
Analysis on the Integration of ERP with E-business 81
Wu Qunli
An Integrated P2P Mobile Learning Model for Timely Farming Guidance 84
Xiaoming Yao, WencaiDu, Baodan Chen, andZhongzhi Yuan
An Integrated Network Performance Monitor System 88
Hungjie Sun
Pattern-Based Blind Spatial Image Watermarking 92
Xiaoming Yao, WencaiDu, Mei Huang, Weihua Wu, andJundongFu
Genetic Algorithm-Based Evaluation Model of Teaching Quality 97
Hongfa Wang, Feng Yu, Chen Xing, andZhimin Zhou
Study on Incremental Data Mining Based on Rough Set Theory 101
ShanGuo Lv andHongLi Chen
Study on Ontology Model Based on Rough Set 105
HongLi Chen and ShanGuo Lv
vi
A General Method ofConstructing the Reversible Full-Adder 109
Lihui Ni, Zhijin Guan, and Wenying Zhu
Automatic Construction of Web-Based English/Chinese Parallel Corpora 114
Bin Tan andXu-yan Zhou
Research on Component Composition with Formal Semantics 118
RuzhiXu, Quansheng Wu, Hongquan Gong, and Leqiu Qian
Multi-modal Medical Image Registration Based on Gradient of Mutual
Information and Hybrid Genetic Algorithm 125
Xiaosheng Huang and Fang Zhang
An Improved Ant Colony Algorithm for VRP Problem 129
Geng-Sheng Wang and Yun-Xin Yu
A Robust EMD-Like Stegnographic Scheme 134
Xiaoming Yao, Wencai Du, Weihua Wu, Mei Huang, andJimdong Fu
SOM-Based Classification Method for Moving Object in Traffic Video 138
Jie Xia, Jian Wu, Yan-yan Cao, and Zhi-ming Cui
The Study ofElectrocardiograph Based on Radial Basis Function Neural
Network 143
Guangying Yang and Yue Chen
SAR Image Segmentation Based on SWT and Improved AFSA 146
Miao Ma, Jian-hui Liang, Li Sun, and Min Wang
The Research of High Noise Image's Restoration and Recognition of Train's
Plates 150
Xiangang Jiang, Dean Ma, and Longfeng Tao
Property Preservation of Time Petri Net Reduction 154
ChuanliangXia and Zhendong Liu
Regional Logistics System Bi-level Programming with Elastic Demand
by Using Fuzzy C-means Clustering 160
Ming-bao Pang, Fang Dong, andXin-ping Zhao
A Strong Deviation Theorem Based on Laplace Transform on
a Non-homogeneous Tree 165
Shaohua Jin, Chongguang Ding, Yongxue Wang, Yanmin Zhang, andJie Lv
Some Strong Limit Theorems for Hidden Markov Models Indexed by
a Non-homogeneous Tree 169
Shaohua Jin, Yongxue Wang, Huitao Liu, Ying Tian, and Hui Li
Dynamic Evolution Simulation of Corporate Governance Based on Swarm 173
Rong-jie Lv and Yu-hongAn
Integrated Security Framework for Secure Web Services 178
Wenjun Zhang
A Preferable Method on Digital Filter in ECG Signal's Processing Based
onFPGA 184
Nianqiang Li, Yongbing Wang, and Guoyi Zhao
vii
A New Scheme on Multifunction Wireless Medical Surveillance System
Based on FPGA 188
Nianqiang Li, Yongbing Wang, and Guoyi Zhao
Research on Application of Region-of-Interest in Face Detection 192
Deng-feng Zhou, Shui-sheng Ye, and Shao-hua Hu
A Study of Image-Based Algorithms of River Sediment Measurement 195
Bing Zhu, Xu-yan Zhou, Bin Tan, Xuan-ge Peng, andXue-mou Liu
A Hybrid Model ofRST and DST with its Application in Intrusion Detection 202
Qing Ye, Xiaoping Wu, Yongqing Liv, and Gaofeng Huang
Detection of Aircraft In-flight Icing in Non-steady Atmosphere Using
Artificial Neural Network 206
Sibin Ying and Jianliang Ai
Two Sub-swarms Quantum-Behaved Particle Swarm Optimization Algorithm
Based on Exchange Strategy 212
Zhihua Liu, Hui Sun, and Haizhi Hu
A Quantifying Metric for Privacy Protection Based on Information Theory 216
Feng Gao, Jingsha He, Shufen Peng, andXu Wu
A Cloud Model Inference System Based Alpha-Beta Filter for Tracking
of Maneuvering Target 221
Huang Jianjun, Zhong Jiali, and Li Pengfei
A PSO Based Array Shape Calibration Utilizing Cyclostationarity 226
Jianjun Huang
ZigBee-based Vehicle Access Control System 232
RongZhou, Chunyue Zhao, LiliFu, Ao Chen, and Meiqian Ye
The Design and Implementation of Electronic Farm System Based on Google
Maps 236
Meiyu Zhang and Jinghua Mei
A Method of Honey Plant Classification Based on IR Spectrum: Extract
Feature Wavelength Using Genetic Algorithm and Classify Using Linear
Discriminate Analysis 241
Yan Yang, Peng-Cheng Nie, and Yong He
Classification Based on Particle Swarm Optimization for Least Square Support
Vector Machines Training 246
Lin Yang andHui Ting Wang
Automated Assessment System for Subjective Questions Based on LSI 250
Xinming Hu andHuosong Xia
A Study of User Downloading Behavior in Mobile Internet Using Clickstream
Data 255
Yanbin Liu and Ping Yuan
Vehicle Edge Detection Based on Multi-structure Mathematical Morphology 258
Yanyan Cao, Hengjun Yue, Man Wu, Jianming Chen, and Zhiming Cui
viii
Estimating Typhoon Rainfall over Sea from SSM/I Satellite Data Using
a Back-Propagated Network 263
Wen-Huan Chine, Hsiao-Ping Wei, Keh-Chia Yeh, Li Chen, Gin-Rong Liu,
and Chang-Hung Chiu
Preparation and Piezomagnetic Effect of FeSiB Amorphous Powders /IIR
Composite Film 268
Da-guo Jiang and Zhao-hui Liu
Design and Implementation of ICAP-Client Based on Improved LRU
Algorithm 271
Shi Lan, Shao Xia, and Zhao Ying
Air Conditioning Load Prediction Based on DE-SVM Algorithm 276
Zhonghai Chen, Yong Sun, Guoli Yang, Tengfei Wit, Guizhu Li, and Longbiao Xin
Comparative Study between the Magic Formula and the Neural Network Tire
Model Based on Genetic Algorithm 280
Chen Long and Huang Chen
The Security Issues of Scientific-Workflow Technique in Network Grid
Computing 285
Feng Wang, Hid Deng, Wei Dai, Sheng Zheng, andBo Liang
A Historical Role-Based Fast Negotiation Model in Open Network 289
Ding Hong and Zhao Yizhu
Design and Application ofNew Topology of Transverse Flux
Permanent-Magnet Motor with Driving System 294
Huan Wang, Yi-kai Shi, Jian-kang Lu, andXiao-qing Yuan
Emotion Recognition of Electromyography Based on Support Vector Machine 298
Guangying Yang and Shanxiao Yang
A Test Platform for Evaluation of Web Service Composition Algorithm 302
Dong Li and Chun-Hui Yang
A Trust Evaluation Model for Web Service Selection 306
Dong Li and Chun-Hui Yang
DW 2.0-Oriented Metadata Evolution Management 311
Ding Pan
The Application of Random Forest and Morphology Analysis to Fault
Diagnosis on the Chain Box of Ships 315
Zhiyuan Yang and Qinming Tan
Threshold Secret Sharing Based Trust Security in Structured P2P Network 320
Cai Biao, Li Zhishu, and Luo Zhen
The Research of Privacy-Preserving Clustering Algorithm 324
Yanguang Shen, Junnii Han, andHuifang Shan
An Improved Algorithm of Collision Detection in 2D Grapple Games 328
Kaiqiang Guo andJiewu Xia
ix
Game Theory Based View to the Quantum Key Distribution BB84 Protocol 332
Mahboobeh Houshmand, Monire Houshmand, andHabib Rajabi Mashhadi
A New Method for Tracing by Using Corner Detecting and
k-Nearest Neighbor 337
Zhang Yang, Gao Liqun, and Ye Shufan
SPIHT Algorithm Combined with Huffman Encoding 341
Wei Li, Zhen Peng Pang, and Zhi Jie Liu
Research on the Knowledge Flow in Supply Chain Based on the Core
Enterprise 344
Liang Xu and Yuanyuan Sun
Efficient Scheduling of Task Graphs to Multiprocessors Using a Combination
of Modified Simulated Annealing and List Based Scheduling 350
Mahboobeh Houshmand, Elaheh Soleymanpour, Hossein Salami, Mahya Amerian,
andHossein Deldari
A Noise Robust Endpoint Detection Algorithm for Whispered Speech Based
on Empirical Mode Decomposition and Entropy 355
Xue-Dan Tan, He-Ming Zhao, Ji-Hua Gu, and Zhi Tao
IRC Botnets' Homology Identifying Method Based on Improved LB_PAA
Distance ofCommunication Characteristic Curves 360
Yan Jia, Runheng Li, Liang Gan, and Guangqiang Chen
A Novel Measure of Diversity for Support Vector Machine Ensemble 366
Kai Li and Hongtao Gao
An Improved Genetic Algorithm Based on Polygymy 371
Gu Min and Yang Feng
Reconstruction of Normal Speech from Whispered Speech Based on RBF
Neural Network 374
Zhi Tao, Xue-Dan Tan, Tao Han, Ji-Hua Gu, Yi-Shen Xu, andHe-Ming Zhao
An NPT Watermarking Algorithm Using Wavelet Image Combination 378
Ji-Hua Git, Yun Shang, andBei-jing Huang
Modeling Document Summarization as Multi-objective Optimization 382
Lei Huang, Yanxiang He, Furu Wei, and Wenjie Li
New Lattice-Based Public-Key Cryptosystem 387
Yali Jiang, XiulingJu, andFeng Shi
A Route-Nearest Neighbor Algorithm for Large-Scale Vehicle Routing
Problem 390
Ruhan He, Weibin Xu, Ying Wang, and Wei Zhan
The Algorithm Study ofSensor Compensation in MWD Instrument Based
on Genetic Elman Neural Network 394
Li-li Jit, Xhi-fang Wang, Sai Ma, and Chun-ming Wei
X
Identification of Nutrition Elements in Orange Leaves by Laser Induced
Breakdown Spectroscopy 398
Mingyin Yao, Mulma Liu, Jinhui Zhao, andLin Huang
An Adaptive Fast Algorithm for Coding Block Mode Selection 402
Weixing Zhu, Yong Ma, and Rixia Wang
The Analysis and Enhancement of Voting Behaviors in P2P Networks 407
Bowei Yang, Guanghua Song, and Yao Zheng
Efficient Group Key Management Scheme in Wireless Sensor Networks 411
GuoruiLi, Ying Wang, and Jingsha He
An Improved Key Management of ZigBee Protocol 416
Bing Zhang and Li Chen
An Improved Method for Similar Handwritten Chinese Character Recognition 419
Fang Yang, Xue-Dong Tian, Xin Zhang, andXin-Biao Jia
Application of Clipboard Monitoring Technology in Graphic and Document
Information Security Protection System 423
Shaobo Li, Shulin Lv, Xiaolmi Jia, and Zhisheng Shao
Optimization of a Subset of Apple Features Based on Modified Particle
Swarm Algorithm 427
Weixing Zhu, Dajun Hou, Jin Zhang, and Jian Zhang
Automated Monitoring System of Pig Behavior Based on RFID
and ARM-LINUX 431
Weixing Zhu, Fangkui Zhong, andXiangping Li
The Solution of Printing on University Human Management System 435
Wei Yang, Chen Guo, andXuan Ge Peng
Research and Application of USB Filter Driver Based on Windows Kernel 438
Shaobo Li, Xiaohui Jia, Shulin Lv, and Zhisheng Shao
The Feasible Control Lyapunov Function of Nonlinear Affine-Control
Systems 442
XiaoDan Chen and ShaoBai Chen
On the Upper Completeness of Quasi-metric Spaces 446
XiaoDan Chen andShaoBai Chen
P2PKMM: A Hybrid Clustering Algorithm over P2P Network 450
Zhong/un Deng, Wei Song, andXuefeng Zheng
The Modeling and Simulation ofNegotiation Process for High-Tech Virtual
Enterprise Based on UML and Petri Net 455
Changyuan Gao, Shuchen Zhang, andXiaoxing Zhang
RFID System Security Using Identity-Based Cryptography 460
Youqin Chen, Zhide Chen, and Li Xu
Intrusion Detection Model Based on Improved Support Vector Machine 465
Jingbo Yuan, Haixiao Li, Shunli Ding, andLimin Cao
xi
Dynamic Replica Selection Using Improved Kernel Density Estimation 470
Yin Pang, Kan Li, Xin Sun, and Kaili Bu
Design of Temperature Control System for a Special Shortwave Infrared
Spatial Remote Sensor Based on FPGA 475
ZhipengXu, Qianting Zhou, and Jim Wei
Associating IDS Alerts by an Improved Apriori Algorithm 478
Wang Taihua and Guo Fan
Three-Dimensional Multiscale Texture Synthesis 483
Junyu Dong, Yuliang Wang, Yan Song, and Guanglin Cheng
Aesthetic Evolution of Staged L-systems for Tiling Pattern Design 488
Yang Li and Chong-chong Zhao
Study on the Convergence of Hybrid Ant Colony Algorithm for Job Shop
Scheduling Problems 493
Xiaoyu Song and Lihua Sun
Negotiation Problem Processing System ofHigh-Tech Virtual Enterprise 498
Lili Zhai andFuguo Chang
A Flexible Fuzzy Comprehensive Evaluation Method 502
Juan Chen
A High Security Dynamic Secret Key Management Scheme for Wireless
Sensor Networks 507
Lanying Li and Xin Wang
An Efficient and Secure Key Establishment Scheme for Wireless Sensor
Network 511
Eric Ke Wang and Yunming Ye
A Focused Crawler Based on Naive Bayes Classifier 517
Wenxian Wang, Xingshu Chen, Yongbin Zou, Haizhou Wang, and Zongkun Dai
Economic Grid Resource Scheduling Based on Utility Optimization 522
Juan Chen
A Study on CRL Issue by P2P Network 526
Zhao Qiu, Mingrui Chen, andJun Huang
Design of Multi-mode E-commerce Recommendation System 530
Zhao Qiu, Mingrui Chen, andJun Huang
4-Step Face Authentication Algorithm Based on SVM 534
Fang-jun Luan, Lan Lin, and Yong-hui Wang
A Security Architecture for Intranet Based on Security Area Division 539
Gao Fuxiang, Li Sha, Wang Xiaolu, and Yao Lan
Attack Simulation and Signature Extraction of Low-Rate DoS 544
Zenghui Liu andLiguo Guan
Research on the Directional Interferences Canceling 549
Bin Zhang
xii
An Ontology for Vulnerability Lifecycle 553
Ratsameetip Wila, Nattanatch Jiamnapanon, and Yunyong Teng-anvmay
A Prototype System of Software Reliability Prediction and Estimation 558
Jintao Zeng, Jinzhong Li, Xiaohui Zeng, and WenlangLuo
How to Construct a Divisible Online/Offline Signature 562
Yilian Zhang, Zhide Chen, and LiXu
Mining Maximal Patterns Based on Improved FP-tree and Array Technique 567
Hua-jin Wang and Chun-an Hu
Research on Active Controllable Defense Model Based on Zero-PDR Model 572
Kehe Wu, Tong Zhang, and Fei Chen
Optimization Design of Supervising and Controlling on the SOFC Integration
System 576
Suying Yang, Meng Wang, Jianying Lin, and Kuijun Meng
A Visual Domain Recognition Method Based on Function Mode for Source
Code Plagiarism 580
Suying Yang andXin Wang
A Multi-mode P2P Live Media Broadcasting Middleware 585
Yin Zhou and Wei Zhu
Automatic Summarization for Chinese Text Based on Combined Words
Recognition and Paragraph Clustering 591
Chang-jin Jiang, Hong Peng, Qian-li Ma, andJian-chao Chen
The Design and Implementation ofHost-Based Intrusion Detection System 595
Ying Lin, Yan Zhang, and Yang-jia Ou
An Improved Pattern Matching Algorithm 599
Jingbo Yuan, Jisen Zheng, and Shunli Ding
Autonomy-Oriented, Self-Equilibrium Routing Model in Traffic Networks 604
Chunyan Yu, Dong)>i Ye, Xiaosheng He, and Mmghui Wu
A New Agent Oriented Model for AutoMotive Computing Platform 609
Chunyan Yu, Dongyi Ye, and Minghui Wu
Mediated Hierarchical Identity-Based Combined Public Key Schemes 614
Pingjian Wang, Jingqiang Lin, Jiwu Jing, and Yongquan Xie
IIS Security Mechanisms 619
Ping Zhang, Yan Zhang, Zhengjiang Wu, and Weifeng Du
The Research on Two Important Counter-Examples of Four-Color Problem 623
Jinbiao Wang and Shu Qin
Characteristics of Network Non-optimum and Extensionality Security Mode 627
Teng Ping and He Ping
Electronic Commerce Technology and its Security Problems 631
Xinqiang Ma and Youyuan Liu
xiii
An Implementation of Object-Based Storage System Access Control Based
on IBE 635
Junjicm Chen, Dan Feng, andJingningLiu
Cascaded SVMs in Pattern Classification for Time-Sensitive Separating 640
Ruihu Wang, Bin Fang, Zhangping Hu, Liang Chen, and Weihua Wang
The Detecting Methods of Geostationary Orbit Objects 645
Min Wei, HaiNing Chen, TianYun Yan, QinZhang Wu, andBin Xu
Research on the Key Technology of Secure Computer Forensics 649
Yan Zhang and Ying Lin
The Method of Early Real-Time Fault Diagnosis for Technical Process Based
on Neural Network 653
Yingjun Guo, Lihua Sun, and Haichao Ran
Overcoming Disadvantages by Making Full Use of Extrinsic Objects:
Advancing Information Resource Construction by ISA 658
Zhonghua Deng and Ying Wu
Efficient Modeling of Spam Images 663
Qiao Liu, Zhiguang Qin, Hongrong Cheng, andMingcheng Wan
Mobile Intelligence Sharing Based on Agents in Mobile Peer-to-Peer
Environment 667
Ye Liang
A Novel Real-Time Face Tracking Algorithm for Detection of Driver Fatigue 671
Qiufen Yangon, Weihua Gui, andHuosheng Hu
Research on High Performance RFID Code Resolving Technology 677
Huifang Deng and Haiyan Kang
An Improved Task Scheduling Algorithm in Embedded Systems 682
Xiong Yumei and Chen Yimin
Product Feature Extraction with a Combined Approach 686
Zhixing Li
An Algorithm of Webpage Information Hiding Based on Class Selectors 691
Guang Sun
An Improved Particle Swarm Optimization Algorithm with Synthetic Update
Mechanism 695
Fei Li
Study of Privacy Preserving Data Mining 700
Haisheng Li
Model of CSR in Chinese Medicine E-commerce Finn: Strategic Management
Perspective 704
Jian Li and Wengeng Shi
Modeling and Simulating of Ecological Community in Digital Creative
Industry 708
Xiaojun Ma, Sa Li, and Weihui Dai
xiv
Modeling and Simulation of Double-tube Hydraulic Damper External
Characteristic 713
Changcheng Zhou and Jie Meng
Research on a High Efficient Intrusion Prevention Model 720
Xiao-hiii Zeng, Wen-lang Luo, Jin-iao Zeng, Yan-ping Chen, and Shi-yao Jin
Application of Data Mining for Decision Tree Model of Multi-variety Discrete
Production and Manufacture 724
Jianfang Sun
A Multiple Population Genetic Algorithm and its Application in Fuzzy
Controller 729
Yukang Tian and Huy Quan Vu
Knowledge Mining for Intelligent Decision Making in Small and Middle
Business 734
Huamin Li, Xingsen Li, and Zhengxiang Zhu
A New Method of Sea-Sky-Line Detection 740
Chunliang Jiang, Hanhong Jiang, Chaoliang Zhang, andJie Wang
Modeling and Dynamic Simulation of Electric Power Steering System
of Automobile Using Bond Graph Technique 744
Lin-an Wang, QiangLi, and Xiao-juan Liang
Design and Implementation of Quantum Factorization Algorithm 748
Xiangqun Fu, Wansu Bao, and Chun Zhou
A Medium Field Multivariate Public Key Signature Scheme with External
Perturbation 753
Li Tian and Wansu Bao
Towards a Theory of Cloud Computing in the Protocol-Composition
Framework 758
Huafei Zhu
Research on Logistics System Architecture Based on SOA 763
Xin Yu and Zhiguang Wei
The Construction and Test for a Small Beowulf Parallel Computing System 767
Wen-lang Luo, An-dong Xie, and Wen Ruan
Research of Image Acquisition Device for River Sediment 771
Xuange Peng, YingXiao, and Bing Zhu
A Collaborative Filtering Algorithm Based on Time Period Partition 777
Yuchuan Zhang and Yuzhao Liu
A Blind Watermark Algorithm for Color Image Based on Dual Scrambling
Technique 781
Hongqin Shi and Fangliang Lv
Artificial Neural Network Method for the Analysis of 1-D Defected Ground
Structure 786
Shan Wang, Yang Jiang, Minghua Gao, Chuanyun Wang, andHaiwen Liu
XV
Volume Rendering Effect Analysis with Image Preprocessing Technology
Based on Three Dimension Anisotropic Diffusion 789
Xiangang Jiang, Lunlun Xu, and Dean Ma
An Intelligent Security Defensive Software Scheme and Realization 793
Kim Wang, Jin-dong Wang, Liu-qing Shen, and Zhen-hua Han
Author Index 797
xvi
Top Related