Jian Weng1,2, Xiang-Xue Li3, Ke-Fei Chen2 and Sheng-Li Liu2
1Department of Computer Science
Jinan University
Guangzhou 510632, P.R. China
2Department of Computer Science and Engineering
3School of Information Security Engineering
Shanghai Jiao Tong University
Shanghai 200240, P.R. China