海词手机词典
  • Finally, the author stress analyzing the 3G authentication, key agreement protocol and its security, finding the security hole and putting forward new authentication and key agreement protocol based on ECC.

    播放读音 播放读音