首页 > 最新文献

Electronics & Communication Engineering Journal最新文献

英文 中文
Mobile agent security 移动代理安全
Pub Date : 2002-12-16 DOI: 10.1049/ECEJ:20020504
N. Borselius
The agent paradigm is currently attracting much research. A mobile agent is a particular type of agent with the ability to migrate from one host to another, where it can resume its execution. We consider security issues that need to be addressed before multi-agent systems in general, and mobile agents in particular, can be a viable solution for a broad range of commercial applications. This is done by considering the implications of the characteristics given to agents and the general properties of open multi-agent systems. The paper then looks in some more detail at security technology and methods applicable to mobile agent systems.
智能体范式目前引起了广泛的研究。移动代理是一种特殊类型的代理,它能够从一台主机迁移到另一台主机,并在那里恢复其执行。我们认为,在多代理系统(特别是移动代理)成为广泛的商业应用程序的可行解决方案之前,需要解决的安全问题。这是通过考虑赋予智能体的特征的含义和开放多智能体系统的一般属性来实现的。在此基础上,对适用于移动代理系统的安全技术和方法进行了较为详细的研究。
{"title":"Mobile agent security","authors":"N. Borselius","doi":"10.1049/ECEJ:20020504","DOIUrl":"https://doi.org/10.1049/ECEJ:20020504","url":null,"abstract":"The agent paradigm is currently attracting much research. A mobile agent is a particular type of agent with the ability to migrate from one host to another, where it can resume its execution. We consider security issues that need to be addressed before multi-agent systems in general, and mobile agents in particular, can be a viable solution for a broad range of commercial applications. This is done by considering the implications of the characteristics given to agents and the general properties of open multi-agent systems. The paper then looks in some more detail at security technology and methods applicable to mobile agent systems.","PeriodicalId":127784,"journal":{"name":"Electronics & Communication Engineering Journal","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126303711","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 215
The smartcard as a mobile security device 智能卡作为移动安全设备
Pub Date : 2002-12-16 DOI: 10.1049/ECEJ:20020503
D. Scheuermann
Modern society would like to replace paper by electronic data carriers and mechanical processes by electronic processes. Smartcards offer one means to this end in the form of a personal mobile security device. Personal data can be stored in a mobile personal environment instead of in a central database, and processor smartcards additionally provide a sort of pocket PC that can perform security functions at a higher level of security than an ordinary PC. Interoperability of different smartcards with different smartcard readers and data terminals is very important; therefore, standards exist for the structure of data objects on the card and for coding the commands sent to the card. Biometric user-authentication is becoming increasingly important for smartcards as an alternative to the previously used PIN or password authentication. Additional convenience for the user can be provided by contactless cards.
现代社会希望用电子数据载体代替纸张,用电子过程代替机械过程。智能卡以个人移动安全设备的形式为实现这一目标提供了一种手段。个人数据可以存储在移动的个人环境中,而不是存储在中央数据库中,处理器智能卡还提供了一种袖珍个人电脑,可以在比普通个人电脑更高的安全级别上执行安全功能。不同智能卡与不同智能卡读卡器和数据终端的互操作性非常重要;因此,存在卡片上数据对象的结构和发送到卡片的命令编码的标准。生物识别用户身份验证对于智能卡来说越来越重要,因为它可以替代以前使用的PIN或密码身份验证。非接触式卡可以为用户提供额外的便利。
{"title":"The smartcard as a mobile security device","authors":"D. Scheuermann","doi":"10.1049/ECEJ:20020503","DOIUrl":"https://doi.org/10.1049/ECEJ:20020503","url":null,"abstract":"Modern society would like to replace paper by electronic data carriers and mechanical processes by electronic processes. Smartcards offer one means to this end in the form of a personal mobile security device. Personal data can be stored in a mobile personal environment instead of in a central database, and processor smartcards additionally provide a sort of pocket PC that can perform security functions at a higher level of security than an ordinary PC. Interoperability of different smartcards with different smartcard readers and data terminals is very important; therefore, standards exist for the structure of data objects on the card and for coding the commands sent to the card. Biometric user-authentication is becoming increasingly important for smartcards as an alternative to the previously used PIN or password authentication. Additional convenience for the user can be provided by contactless cards.","PeriodicalId":127784,"journal":{"name":"Electronics & Communication Engineering Journal","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134107060","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
Secure mobile commerce 安全的移动商务
Pub Date : 2002-12-16 DOI: 10.1049/ECEJ:20020506
S. Schwiderski-Grosche, H. Knospe
M-commerce, or mobile commerce, is a major application domain for mobile devices, enabling users to perform commercial transactions wherever they go. However, these applications require a high level of security. In this paper, the special characteristics of m-commerce are identified and some important security issues considered.
移动商务或移动商务是移动设备的主要应用领域,使用户无论走到哪里都可以进行商业交易。但是,这些应用程序需要高级别的安全性。本文指出了移动商务的特点,并对一些重要的安全问题进行了思考。
{"title":"Secure mobile commerce","authors":"S. Schwiderski-Grosche, H. Knospe","doi":"10.1049/ECEJ:20020506","DOIUrl":"https://doi.org/10.1049/ECEJ:20020506","url":null,"abstract":"M-commerce, or mobile commerce, is a major application domain for mobile devices, enabling users to perform commercial transactions wherever they go. However, these applications require a high level of security. In this paper, the special characteristics of m-commerce are identified and some important security issues considered.","PeriodicalId":127784,"journal":{"name":"Electronics & Communication Engineering Journal","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130141476","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 112
Security issues for downloaded code in mobile phones 手机中下载代码的安全问题
Pub Date : 2002-12-16 DOI: 10.1049/ECEJ:20020505
D. Babb, C. Bishop, T. Dodgson
'Software defined radio' (SDR) is a technology that will appear in future generations of mobile phones, i.e. following the third-generation mobile phone technology that is currently being defined and developed. Early versions of 'pragmatic' SDR will allow the terminal to be reconfigured at any level of its protocol stack. Ultimately, the 'pure' SDR technology will allow a mobile phone or terminal to have its air interface software configured or reconfigured by other software (or software parameters) that have been downloaded to the terminal, e.g. over the air, or from a remote server via the Internet and one's personal computer (PC). A number of security issues arise with downloaded code that implements the air interface functions, and these may not be obvious simply from looking at the way PC software is updated on-line today. This paper starts with an outline of the code that allows a mobile phone to operate over a particular air interface. This sets the baseline for a discussion of the security issues surrounding the change of this code from one that is fixed and downloaded once only, to code that is reconfigurable during the life of a product.
“软件定义无线电”(SDR)是一项将在未来几代移动电话中出现的技术,即继目前正在定义和开发的第三代移动电话技术之后。早期版本的“实用”SDR将允许终端在其协议栈的任何级别重新配置。最终,“纯”SDR技术将允许移动电话或终端通过已下载到终端的其他软件(或软件参数)配置或重新配置其空中接口软件,例如通过空中,或通过互联网和个人电脑从远程服务器(PC)。实现空中接口功能的下载代码出现了许多安全问题,这些问题可能并不明显,仅仅从今天PC软件在线更新的方式来看。本文首先概述了允许移动电话在特定的空中接口上操作的代码。这为讨论围绕这些代码的安全问题设置了基线,这些代码从一个固定且只下载一次的代码更改为在产品生命周期中可重新配置的代码。
{"title":"Security issues for downloaded code in mobile phones","authors":"D. Babb, C. Bishop, T. Dodgson","doi":"10.1049/ECEJ:20020505","DOIUrl":"https://doi.org/10.1049/ECEJ:20020505","url":null,"abstract":"'Software defined radio' (SDR) is a technology that will appear in future generations of mobile phones, i.e. following the third-generation mobile phone technology that is currently being defined and developed. Early versions of 'pragmatic' SDR will allow the terminal to be reconfigured at any level of its protocol stack. Ultimately, the 'pure' SDR technology will allow a mobile phone or terminal to have its air interface software configured or reconfigured by other software (or software parameters) that have been downloaded to the terminal, e.g. over the air, or from a remote server via the Internet and one's personal computer (PC). A number of security issues arise with downloaded code that implements the air interface functions, and these may not be obvious simply from looking at the way PC software is updated on-line today. This paper starts with an outline of the code that allows a mobile phone to operate over a particular air interface. This sets the baseline for a discussion of the security issues surrounding the change of this code from one that is fixed and downloaded once only, to code that is reconfigurable during the life of a product.","PeriodicalId":127784,"journal":{"name":"Electronics & Communication Engineering Journal","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134054245","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Security for mobility 移动安全
Pub Date : 2002-12-16 DOI: 10.1049/ECEJ:20020508
C. Mitchell
* Part I: Underlying technologies * Chapter 1: Cryptography for mobile security * Chapter 2: PKI in mobile systems * Chapter 3: The personal PKI * Chapter 4: The smartcard as a mobile security device * Chapter 5: Secure mobile tokens - the future * Part II: Network security * Chapter 6: UMTS security * Chapter 7: Securing network access in future mobile systems * Chapter 8: Public key based network access * Chapter 9: Security in personal area networks * Chapter 10: Towards the security of routing in ad hoc networks * Chapter 11: Security issues in a MobileIPv6 network * Part III: Mobile code issues * Chapter 12: Security for agent systems and mobile agents * Chapter 13: Security issues for downloaded code in mobile phones * Part IV: Application security * Chapter 14: Secure mobile commerce * Chapter 15: Securing the delivery of digital content over the Internet * Chapter 16: Security for future standardised DRM * Part V: The future * Chapter 17: Pioneering advanced mobile privacy and security
*第一部分:底层技术*第1章:移动安全加密*第二章:PKI在移动系统*第三章:个人PKI *第四章:智能卡作为移动安全设备*第五章“安全移动令牌-未来*第二部分:网络安全*第六章:UMTS安全*第七章:确保在未来移动通信系统网络访问*第八章:基于公钥的网络访问*第九章:安全在个人区域网络*第十章:对在ad hoc网络路由的安全*第十一章:安全问题在MobileIPv6网络*第三部分:移动代码问题*第十二章:安全代理系统和移动代理*第13章:安全问题在手机下载代码*第四部分:应用程序安全性*第十四章:安全的移动商务*第十五章:通过互联网获得数字内容的交付*第十六章:安全未来标准化DRM *第五部分:未来* 17章开拓先进的移动隐私和安全
{"title":"Security for mobility","authors":"C. Mitchell","doi":"10.1049/ECEJ:20020508","DOIUrl":"https://doi.org/10.1049/ECEJ:20020508","url":null,"abstract":"* Part I: Underlying technologies * Chapter 1: Cryptography for mobile security * Chapter 2: PKI in mobile systems * Chapter 3: The personal PKI * Chapter 4: The smartcard as a mobile security device * Chapter 5: Secure mobile tokens - the future * Part II: Network security * Chapter 6: UMTS security * Chapter 7: Securing network access in future mobile systems * Chapter 8: Public key based network access * Chapter 9: Security in personal area networks * Chapter 10: Towards the security of routing in ad hoc networks * Chapter 11: Security issues in a MobileIPv6 network * Part III: Mobile code issues * Chapter 12: Security for agent systems and mobile agents * Chapter 13: Security issues for downloaded code in mobile phones * Part IV: Application security * Chapter 14: Secure mobile commerce * Chapter 15: Securing the delivery of digital content over the Internet * Chapter 16: Security for future standardised DRM * Part V: The future * Chapter 17: Pioneering advanced mobile privacy and security","PeriodicalId":127784,"journal":{"name":"Electronics & Communication Engineering Journal","volume":"20 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116673857","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Securing the delivery of digital content over the Internet 确保透过互联网传送数码内容
Pub Date : 2002-12-16 DOI: 10.1049/ECEJ:20020507
A. Waller, Glyn Jones, T. Whitley, J. Edwards, D. Kaleshi, A. Munro, B. MacFarlane, A. Wood
This paper looks at the security issues that arise for the browsing, selection and delivery of digital content over the Internet. Particular emphasis is placed on the problems of finding security solutions for microtransactions (small items of content) and micropayments (low-value content), and the digital rights management issues concerning the protection of content after it has been delivered to consumers. The paper concludes with a description of the secure content delivery system developed during the SIBIS project, which addresses many of the issues raised.
本文着眼于在互联网上浏览、选择和传送数字内容时出现的安全问题。特别强调的是为微交易(小内容)和微支付(低价值内容)寻找安全解决方案的问题,以及涉及内容交付给消费者后保护的数字版权管理问题。本文最后描述了在SIBIS项目期间开发的安全内容交付系统,该系统解决了提出的许多问题。
{"title":"Securing the delivery of digital content over the Internet","authors":"A. Waller, Glyn Jones, T. Whitley, J. Edwards, D. Kaleshi, A. Munro, B. MacFarlane, A. Wood","doi":"10.1049/ECEJ:20020507","DOIUrl":"https://doi.org/10.1049/ECEJ:20020507","url":null,"abstract":"This paper looks at the security issues that arise for the browsing, selection and delivery of digital content over the Internet. Particular emphasis is placed on the problems of finding security solutions for microtransactions (small items of content) and micropayments (low-value content), and the digital rights management issues concerning the protection of content after it has been delivered to consumers. The paper concludes with a description of the secure content delivery system developed during the SIBIS project, which addresses many of the issues raised.","PeriodicalId":127784,"journal":{"name":"Electronics & Communication Engineering Journal","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114763347","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
Public key infrastructure in mobile systems 移动系统中的公钥基础设施
Pub Date : 2002-12-16 DOI: 10.1049/ECEJ:20020501
J. Dankers, T. Garefalakis, R. Schaffelhofer, T. Wright
In current mobile systems, some applications to some extent already use public key techniques and an underlying public key infrastructure (PKI) to provide end-to-end security, and such use is widely expected to grow. This paper provides an overview of the basic techniques and the entities that are involved in a PKI and describes how they are used in current mobile systems. The paper also highlights the envisaged use of PKI in future mobile systems and the challenges that brings, drawing on results of the European Union's SHAMAN project.
在当前的移动系统中,一些应用程序在某种程度上已经使用了公钥技术和底层公钥基础设施(PKI)来提供端到端的安全性,并且这种使用被广泛预期将会增长。本文概述了PKI中涉及的基本技术和实体,并描述了它们如何在当前的移动系统中使用。该文件还强调了PKI在未来移动系统中的设想使用及其带来的挑战,并借鉴了欧盟SHAMAN项目的结果。
{"title":"Public key infrastructure in mobile systems","authors":"J. Dankers, T. Garefalakis, R. Schaffelhofer, T. Wright","doi":"10.1049/ECEJ:20020501","DOIUrl":"https://doi.org/10.1049/ECEJ:20020501","url":null,"abstract":"In current mobile systems, some applications to some extent already use public key techniques and an underlying public key infrastructure (PKI) to provide end-to-end security, and such use is widely expected to grow. This paper provides an overview of the basic techniques and the entities that are involved in a PKI and describes how they are used in current mobile systems. The paper also highlights the envisaged use of PKI in future mobile systems and the challenges that brings, drawing on results of the European Union's SHAMAN project.","PeriodicalId":127784,"journal":{"name":"Electronics & Communication Engineering Journal","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134332003","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 50
Hidden antennas for vehicles 车辆隐藏式天线
Pub Date : 2002-12-01 DOI: 10.1049/ECEJ:20020601
R. Langley, J. Batchelor
The introduction of new telematics and broadcast systems into vehicles has led to a requirement for multiple antennas that can be hidden from view. This paper commences by presenting the results of simulations to identify the components of a car's structure that influence the radiation pattern of a printed VHF antenna on the rear windscreen. Two dual-band antenna designs are then presented for operation in the 900 and 1800 MHz telephone bands. The first is a planar inverted-F antenna that can be concealed in the bumpers, the second a hybrid structure based on the top-loaded monopole principle and mounted beneath the vehicle's roof.
在车辆中引入新的远程信息处理和广播系统,导致对可以隐藏在视线之外的多个天线的需求。本文首先介绍了模拟结果,以确定影响后挡风玻璃上印刷VHF天线辐射方向图的汽车结构部件。然后提出了在900和1800兆赫电话频段上运行的两种双频天线设计。第一种是可以隐藏在保险杠中的平面倒f天线,第二种是基于顶载单极子原理的混合结构,安装在车顶下方。
{"title":"Hidden antennas for vehicles","authors":"R. Langley, J. Batchelor","doi":"10.1049/ECEJ:20020601","DOIUrl":"https://doi.org/10.1049/ECEJ:20020601","url":null,"abstract":"The introduction of new telematics and broadcast systems into vehicles has led to a requirement for multiple antennas that can be hidden from view. This paper commences by presenting the results of simulations to identify the components of a car's structure that influence the radiation pattern of a printed VHF antenna on the rear windscreen. Two dual-band antenna designs are then presented for operation in the 900 and 1800 MHz telephone bands. The first is a planar inverted-F antenna that can be concealed in the bumpers, the second a hybrid structure based on the top-loaded monopole principle and mounted beneath the vehicle's roof.","PeriodicalId":127784,"journal":{"name":"Electronics & Communication Engineering Journal","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134053593","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Opportunities in radar-2002 雷达的机遇-2002
Pub Date : 2002-12-01 DOI: 10.1049/ECEJ:20020602
M. Skolnik
This paper addresses some of the potential opportunities for achieving advances in radar systems and technology. It is not a summary of current interests in radar, nor is it a forecast of what 'will be', but is speculation about what 'could be' based on the limited experiences and personal biases of the writer. Included are the replacement of existing radars that have been in use for some time, 'on-the-shelf' concepts and demonstrated technology that have yet to be employed, a few new directions that might offer capabilities that do not currently exist, and areas of basic technology that could be further explored to provide new understanding and new capabilities. Although much is included in the paper, it is not meant to be an exhaustive enumeration of the many possible directions for future radar.
本文讨论了实现雷达系统和技术进步的一些潜在机会。它不是对雷达当前兴趣的总结,也不是对“将会是什么”的预测,而是基于作者有限的经验和个人偏见对“可能是什么”的推测。包括替换已经使用了一段时间的现有雷达,“现成的”概念和尚未采用的演示技术,一些可能提供目前不存在的能力的新方向,以及可以进一步探索的基础技术领域,以提供新的理解和新的能力。虽然论文中包含了很多内容,但它并不意味着对未来雷达的许多可能方向进行详尽的列举。
{"title":"Opportunities in radar-2002","authors":"M. Skolnik","doi":"10.1049/ECEJ:20020602","DOIUrl":"https://doi.org/10.1049/ECEJ:20020602","url":null,"abstract":"This paper addresses some of the potential opportunities for achieving advances in radar systems and technology. It is not a summary of current interests in radar, nor is it a forecast of what 'will be', but is speculation about what 'could be' based on the limited experiences and personal biases of the writer. Included are the replacement of existing radars that have been in use for some time, 'on-the-shelf' concepts and demonstrated technology that have yet to be employed, a few new directions that might offer capabilities that do not currently exist, and areas of basic technology that could be further explored to provide new understanding and new capabilities. Although much is included in the paper, it is not meant to be an exhaustive enumeration of the many possible directions for future radar.","PeriodicalId":127784,"journal":{"name":"Electronics & Communication Engineering Journal","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114678233","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
Future radar developments 未来雷达发展
Pub Date : 2002-12-01 DOI: 10.1049/ECEJ:20020605
H. Griffiths
{"title":"Future radar developments","authors":"H. Griffiths","doi":"10.1049/ECEJ:20020605","DOIUrl":"https://doi.org/10.1049/ECEJ:20020605","url":null,"abstract":"","PeriodicalId":127784,"journal":{"name":"Electronics & Communication Engineering Journal","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127576973","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
Electronics & Communication Engineering Journal
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1