Tang, Wenjing
Wang, Yilei
He, Wei
Funding for this research was provided by:
National Natural Science Foundation of China (61170161)
the Nature Science Foundation of Shandong Province (ZR2012FQ029)
Outstanding Young Scientists Foundation Grant of Shandong Province (BS2014DX016)
Ph.D. Programs Foundation of Ludong University (LY2015033)
Fujian Provincial Key Laboratory of Network Security and Cryptology Research Fund (Fujian Normal University) (15004)