海词手机词典
  • In this paper,the security and technique requirements ofprotocols for authentication are given,and a protocol for authentication of mobile proxy hosts in mobile computing networks is proposed.

    播放读音 播放读音