首页 > 最新文献

2009 International Conference on Computer and Communications Security最新文献

英文 中文
An Optimization Method for Power/Ground Network Based on Genetic Algorithm 一种基于遗传算法的电/地网络优化方法
Pub Date : 2009-12-05 DOI: 10.1109/ICCCS.2009.17
H. Liying, T. Hongmei, Zhang Ruoyan, Zhang Cunshan, Zhao Hongdong
An optimization method for power/ground network based on genetic algorithm was presented in this paper. The method could deal with the problem from the VLSI placement stage combined with the characteristic of the power/ground network. It had optimized the power/ground network floor planning by the improvement of the placement of the modules. The simulation proved that the anticipant result was achieved.
提出了一种基于遗传算法的电力/地网络优化方法。该方法结合电源/地网络的特点,可以从超大规模集成电路安装阶段开始解决问题。通过对模块布局的改进,优化了电源/地网平面规划。仿真结果表明,达到了预期的效果。
{"title":"An Optimization Method for Power/Ground Network Based on Genetic Algorithm","authors":"H. Liying, T. Hongmei, Zhang Ruoyan, Zhang Cunshan, Zhao Hongdong","doi":"10.1109/ICCCS.2009.17","DOIUrl":"https://doi.org/10.1109/ICCCS.2009.17","url":null,"abstract":"An optimization method for power/ground network based on genetic algorithm was presented in this paper. The method could deal with the problem from the VLSI placement stage combined with the characteristic of the power/ground network. It had optimized the power/ground network floor planning by the improvement of the placement of the modules. The simulation proved that the anticipant result was achieved.","PeriodicalId":103274,"journal":{"name":"2009 International Conference on Computer and Communications Security","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129896397","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Nonsingularity on the Symmetric r-Circulant Matrices 对称r-循环矩阵的非奇异性
Pub Date : 2009-12-05 DOI: 10.1109/ICCCS.2009.33
C. Dong
Circulant matrix is important since it is an active research field of applied mathematic and computation mathematic increasingly . R-circulant matrices have applied in numerical computation, signal processing, coding theory and oil investigation in recent years, and so on. In this paper, motivated by [1], we give some discriminations by using only the elements in the first row of the r-circulant matrix in the diagonal matrix on non singularity, and give two examples at last.
循环矩阵日益成为应用数学和计算数学中一个活跃的研究领域。近年来,r循环矩阵在数值计算、信号处理、编码理论和石油勘探等领域得到了广泛的应用。本文在[1]的启发下,在非奇异对角矩阵上,仅利用r-循环矩阵第一行的元素给出了一些判别,最后给出了两个例子。
{"title":"The Nonsingularity on the Symmetric r-Circulant Matrices","authors":"C. Dong","doi":"10.1109/ICCCS.2009.33","DOIUrl":"https://doi.org/10.1109/ICCCS.2009.33","url":null,"abstract":"Circulant matrix is important since it is an active research field of applied mathematic and computation mathematic increasingly . R-circulant matrices have applied in numerical computation, signal processing, coding theory and oil investigation in recent years, and so on. In this paper, motivated by [1], we give some discriminations by using only the elements in the first row of the r-circulant matrix in the diagonal matrix on non singularity, and give two examples at last.","PeriodicalId":103274,"journal":{"name":"2009 International Conference on Computer and Communications Security","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132585069","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Improved Incremental Mining Algorithm Based on Risk Analysis of the Association Rules for Bank Cost Analysis 基于关联规则风险分析的银行成本分析改进增量挖掘算法
Pub Date : 2009-12-05 DOI: 10.1109/ICCCS.2009.35
Mei Chunguo, Mei Ying
This paper introduces improving rate and proposes the incremental mining algorithm with the weighted model for optimizing association rules based on CBA mining algorithm. The risk analysis of the strong association rules is proposed for trend forecasting. And the risk degree of the lost rules based on the incremental mining is also analyzed. Comparing with the traditional algorithm, the improved algorithm is fast, efficient in incremental data mining and can find trends in association rules. The decision making reliability is enhanced by the association rules obtained from the improved algorithm. The algorithm was used in bank cost analysis with test results showing that the prediction precision of the algorithm is better than that of the traditional algorithm.
在引入改进率的基础上,提出了基于CBA挖掘算法的关联规则优化加权模型的增量挖掘算法。提出了基于强关联规则的趋势预测风险分析方法。并对基于增量挖掘的规则丢失风险程度进行了分析。与传统算法相比,改进算法在增量数据挖掘中速度快、效率高,能够发现关联规则中的趋势。改进算法得到的关联规则提高了决策的可靠性。将该算法应用于银行成本分析,测试结果表明,该算法的预测精度优于传统算法。
{"title":"An Improved Incremental Mining Algorithm Based on Risk Analysis of the Association Rules for Bank Cost Analysis","authors":"Mei Chunguo, Mei Ying","doi":"10.1109/ICCCS.2009.35","DOIUrl":"https://doi.org/10.1109/ICCCS.2009.35","url":null,"abstract":"This paper introduces improving rate and proposes the incremental mining algorithm with the weighted model for optimizing association rules based on CBA mining algorithm. The risk analysis of the strong association rules is proposed for trend forecasting. And the risk degree of the lost rules based on the incremental mining is also analyzed. Comparing with the traditional algorithm, the improved algorithm is fast, efficient in incremental data mining and can find trends in association rules. The decision making reliability is enhanced by the association rules obtained from the improved algorithm. The algorithm was used in bank cost analysis with test results showing that the prediction precision of the algorithm is better than that of the traditional algorithm.","PeriodicalId":103274,"journal":{"name":"2009 International Conference on Computer and Communications Security","volume":"282 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114944524","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Study on Coding Stimulus via Independent Components Energies of Multichannel Local Field Potentials 多通道局部场电位独立分量能量编码刺激的研究
Pub Date : 2009-12-05 DOI: 10.1109/ICCCS.2009.39
Duan Xufei, Mai Meifang, L. Baoming, Tian Xin
The aim of this paper is to investigate how the energies of Independent Components (ICs) of multichannel Local Field Potentials (LFPs) code a stimulus. In this research, 13-channel pre- and post-stimulus LFPs are decomposed into 13 ICs, the energies of which are computed in a 100-ms window. By sliding the window with a step of 25ms, a dynamic energy mapping of the 13 ICs is established. The results show that the energies of 3 ICs present step response at the onset of the stimulus, which indicates that the ICs’ energies of LFPs on the particular directions can code a stimulus.
本文的目的是研究多通道局部场电位(LFPs)的独立分量(ic)能量如何编码一个刺激。在本研究中,将13通道刺激前和刺激后lfp分解为13个ic,在100 ms窗口内计算其能量。通过以25ms的步长滑动窗口,建立了13个ic的动态能量映射。结果表明,在刺激开始时,3个ic的能量呈阶跃响应,表明lfp在特定方向上的ic能量可以编码刺激。
{"title":"A Study on Coding Stimulus via Independent Components Energies of Multichannel Local Field Potentials","authors":"Duan Xufei, Mai Meifang, L. Baoming, Tian Xin","doi":"10.1109/ICCCS.2009.39","DOIUrl":"https://doi.org/10.1109/ICCCS.2009.39","url":null,"abstract":"The aim of this paper is to investigate how the energies of Independent Components (ICs) of multichannel Local Field Potentials (LFPs) code a stimulus. In this research, 13-channel pre- and post-stimulus LFPs are decomposed into 13 ICs, the energies of which are computed in a 100-ms window. By sliding the window with a step of 25ms, a dynamic energy mapping of the 13 ICs is established. The results show that the energies of 3 ICs present step response at the onset of the stimulus, which indicates that the ICs’ energies of LFPs on the particular directions can code a stimulus.","PeriodicalId":103274,"journal":{"name":"2009 International Conference on Computer and Communications Security","volume":"112 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122776605","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Discussion of Chaos Algorithm Apply in RFID Authentication Protocol 混沌算法在RFID认证协议中的应用探讨
Pub Date : 2009-12-05 DOI: 10.1109/ICCCS.2009.22
Li Heng, Gao-lei Fei, Xue Yanming, F. Shuo
Enhancement and promotion of RFID technology, making RFID a growing range of application areas, for cost and technical considerations, the current RFID system, the security of information transmitted under consideration, for people to develop a variety of authentication protocol, for information security to a certain extent improved. However, the current authentication protocols are still some gaps, so we are considering the introduction of the existing authentication protocol chaotic algorithm, the plaintext information transmitted encrypted, thus increasing the RFID system's information security.
RFID技术的增强和推广,使得RFID的应用领域越来越广泛,出于成本和技术的考虑,目前的RFID系统在考虑信息传输的安全性,为人们开发了多种认证协议,对于信息的安全性有了一定的提高。但是,目前的认证协议还存在一些空白,因此我们考虑引入现有的认证协议混沌算法,将明文信息加密传输,从而增加RFID系统的信息安全性。
{"title":"Discussion of Chaos Algorithm Apply in RFID Authentication Protocol","authors":"Li Heng, Gao-lei Fei, Xue Yanming, F. Shuo","doi":"10.1109/ICCCS.2009.22","DOIUrl":"https://doi.org/10.1109/ICCCS.2009.22","url":null,"abstract":"Enhancement and promotion of RFID technology, making RFID a growing range of application areas, for cost and technical considerations, the current RFID system, the security of information transmitted under consideration, for people to develop a variety of authentication protocol, for information security to a certain extent improved. However, the current authentication protocols are still some gaps, so we are considering the introduction of the existing authentication protocol chaotic algorithm, the plaintext information transmitted encrypted, thus increasing the RFID system's information security.","PeriodicalId":103274,"journal":{"name":"2009 International Conference on Computer and Communications Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125819245","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The Research of Intrusion Detection Model Based on Clustering Analysis 基于聚类分析的入侵检测模型研究
Pub Date : 2009-12-05 DOI: 10.1109/ICCCS.2009.40
Liang Bo, Dong-Dong Jiang
Through the research and analysis of the intrusion detection techniques and data mining, this paper presents a intrusion detection model which is based on cluster analysis K-means algorithm.
通过对入侵检测技术和数据挖掘技术的研究和分析,提出了一种基于聚类分析k -均值算法的入侵检测模型。
{"title":"The Research of Intrusion Detection Model Based on Clustering Analysis","authors":"Liang Bo, Dong-Dong Jiang","doi":"10.1109/ICCCS.2009.40","DOIUrl":"https://doi.org/10.1109/ICCCS.2009.40","url":null,"abstract":"Through the research and analysis of the intrusion detection techniques and data mining, this paper presents a intrusion detection model which is based on cluster analysis K-means algorithm.","PeriodicalId":103274,"journal":{"name":"2009 International Conference on Computer and Communications Security","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117043295","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Research on Congestion Control in Networks Based on Chaos Theory 基于混沌理论的网络拥塞控制研究
Pub Date : 2009-12-05 DOI: 10.1109/ICCCS.2009.12
Zhang Baojian, Zhu Kunhua
This paper describes the reasons of congestion in networks and the typical congestion control strategy briefly first, and then study on chaos characteristics of the internet traffic and discussion on causes. And then put forth a network congestion control strategy based on chaos theory which promises to open new avenues to network congestion control.
本文首先简要介绍了网络拥塞的原因和典型的拥塞控制策略,然后研究了互联网流量的混沌特性并对其原因进行了讨论。然后提出了一种基于混沌理论的网络拥塞控制策略,有望为网络拥塞控制开辟新的途径。
{"title":"Research on Congestion Control in Networks Based on Chaos Theory","authors":"Zhang Baojian, Zhu Kunhua","doi":"10.1109/ICCCS.2009.12","DOIUrl":"https://doi.org/10.1109/ICCCS.2009.12","url":null,"abstract":"This paper describes the reasons of congestion in networks and the typical congestion control strategy briefly first, and then study on chaos characteristics of the internet traffic and discussion on causes. And then put forth a network congestion control strategy based on chaos theory which promises to open new avenues to network congestion control.","PeriodicalId":103274,"journal":{"name":"2009 International Conference on Computer and Communications Security","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114344797","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Evaluation Criterion of Side-Channel Countermeasures for Elliptic Curve Cryptography Devices 椭圆曲线密码装置侧信道对抗的评价准则
Pub Date : 2009-12-05 DOI: 10.1109/ICCCS.2009.13
Tingding Chen, Huiyun Li, Keke Wu, Fengqi Yu
The Elliptic Curve Cryptography (ECC) is widely deployed into embedded cryptographic devices. However, straightforward implementations of ECC are prone to side-channel analysis attacks. A number of countermeasures against side-channel analysis attacks exist with different effectiveness and efficiency. How to evaluate these countermeasures with a unified and quantitative criterion becomes a challenging task. This paper presents an evaluation criterion using the ratio between the security factor and the computational cost, to assess the efficiency and effectiveness of side-channel countermeasures. The security factor statistically measures the similarity between operations processing bit ‘0’ and those processing bit ‘1’. The computation cost measures the number of atomic operations in the scalar multiplication. Experiment results on smart cards with three different countermeasures demonstrate the feasibility of the proposed evaluation criterion.
椭圆曲线加密(ECC)被广泛应用于嵌入式加密设备中。然而,ECC的直接实现容易受到侧信道分析攻击。针对侧信道分析攻击存在多种对抗手段,其效果和效率各不相同。如何用统一的、定量的标准来评价这些对策,成为一项具有挑战性的任务。本文提出了一种利用安全系数与计算成本之比来评估侧信道对抗效率和有效性的评价准则。安全系数统计度量处理位“0”和处理位“1”的操作之间的相似性。计算成本度量标量乘法中原子操作的次数。在智能卡上三种不同对策的实验结果验证了所提评价标准的可行性。
{"title":"Evaluation Criterion of Side-Channel Countermeasures for Elliptic Curve Cryptography Devices","authors":"Tingding Chen, Huiyun Li, Keke Wu, Fengqi Yu","doi":"10.1109/ICCCS.2009.13","DOIUrl":"https://doi.org/10.1109/ICCCS.2009.13","url":null,"abstract":"The Elliptic Curve Cryptography (ECC) is widely deployed into embedded cryptographic devices. However, straightforward implementations of ECC are prone to side-channel analysis attacks. A number of countermeasures against side-channel analysis attacks exist with different effectiveness and efficiency. How to evaluate these countermeasures with a unified and quantitative criterion becomes a challenging task. This paper presents an evaluation criterion using the ratio between the security factor and the computational cost, to assess the efficiency and effectiveness of side-channel countermeasures. The security factor statistically measures the similarity between operations processing bit ‘0’ and those processing bit ‘1’. The computation cost measures the number of atomic operations in the scalar multiplication. Experiment results on smart cards with three different countermeasures demonstrate the feasibility of the proposed evaluation criterion.","PeriodicalId":103274,"journal":{"name":"2009 International Conference on Computer and Communications Security","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127854295","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Electronic Seal Based on Hash Function and Digital Watermark 基于哈希函数和数字水印的电子印章
Pub Date : 2009-12-05 DOI: 10.1109/ICCCS.2009.41
Li Bo, Li Wei
To address the defect of the simplex digital signature in E-Commerce and E-Government, the paper presents a method of electronic seal based on the digital watermark technology. The method combines one-way hash function and digital watermarking, implements the tamper-proofing of electronic documents, anti-copy of e-seal and secure access control function, can effectively to meet the basic needs of electronic document and security requirements. This paper shows experimental results and the future direction of development.
针对电子商务和电子政务中单纯数字签名的缺陷,提出了一种基于数字水印技术的电子印章方法。该方法将单向哈希函数与数字水印相结合,实现了电子文档的防篡改、电子印章的防复制和安全访问控制功能,能够有效地满足电子文档的基本需求和安全要求。本文给出了实验结果和未来的发展方向。
{"title":"Electronic Seal Based on Hash Function and Digital Watermark","authors":"Li Bo, Li Wei","doi":"10.1109/ICCCS.2009.41","DOIUrl":"https://doi.org/10.1109/ICCCS.2009.41","url":null,"abstract":"To address the defect of the simplex digital signature in E-Commerce and E-Government, the paper presents a method of electronic seal based on the digital watermark technology. The method combines one-way hash function and digital watermarking, implements the tamper-proofing of electronic documents, anti-copy of e-seal and secure access control function, can effectively to meet the basic needs of electronic document and security requirements. This paper shows experimental results and the future direction of development.","PeriodicalId":103274,"journal":{"name":"2009 International Conference on Computer and Communications Security","volume":"259 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133450648","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Polynomial Fitness Simulation of Chinese New Stockholders 中国新股东的多项式适应度模拟
Pub Date : 2009-12-05 DOI: 10.1109/ICCCS.2009.48
Deng Wei, Shao Xiaoyi
This paper studies the relationship between amounts of new stockholders and share index in Chinese stock market. We analyze behavior characters of investors, construct a model to forecast the amounts based on polynomial fitness such as quintic, nine times’, eleven times’ polynomial fitness ordinally. Comparing with factual data, we apply polynomial simulation method to review the fitness of model, and confirm sensitivities of thedata. The result proves the validity of the simulation method.
本文研究了中国股票市场新股民数量与股票指数之间的关系。分析了投资者的行为特征,构建了基于五次、九次、十一次多项式适应度的投资金额预测模型。通过与实际数据的比较,采用多项式模拟的方法对模型的适应度进行了检验,验证了数据的敏感性。仿真结果证明了该方法的有效性。
{"title":"Polynomial Fitness Simulation of Chinese New Stockholders","authors":"Deng Wei, Shao Xiaoyi","doi":"10.1109/ICCCS.2009.48","DOIUrl":"https://doi.org/10.1109/ICCCS.2009.48","url":null,"abstract":"This paper studies the relationship between amounts of new stockholders and share index in Chinese stock market. We analyze behavior characters of investors, construct a model to forecast the amounts based on polynomial fitness such as quintic, nine times’, eleven times’ polynomial fitness ordinally. Comparing with factual data, we apply polynomial simulation method to review the fitness of model, and confirm sensitivities of thedata. The result proves the validity of the simulation method.","PeriodicalId":103274,"journal":{"name":"2009 International Conference on Computer and Communications Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129956412","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2009 International Conference on Computer and Communications Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1