首页 > 最新文献

IEEE Transactions on Information Forensics and Security最新文献

英文 中文
PQ-ABS: Post-Quantum Aggregate Blind Signature-Based Anonymous Authentication for Blockchain-Enabled IoMT PQ-ABS:基于后量子聚合盲签名的区块链IoMT匿名认证
IF 8 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2026-01-23 DOI: 10.1109/TIFS.2026.3657031
Arman Ahmad;S. Jagatheswari
Blockchain-enabled Internet of Medical Things (BIoMT) systems require secure and anonymous authentication. However, existing mechanisms rely on classical cryptography, which becomes vulnerable to quantum attacks. This creates a critical need for post-quantum secure authentication that can preserve anonymity while remaining lightweight for large-scale deployments. To address this gap, we propose a module-lattice based Post-Quantum Aggregate Blind Signature (PQ-ABS) scheme that combines message blindness, signature aggregation, and Module-LWE hardness to achieve anonymous and quantum-resistant authentication. The scheme integrates with a lightweight blockchain architecture in which multiple signatures from distributed medical entities are aggregated into a single compact proof, significantly reducing verification overhead as the number of nodes increases. Formal analysis demonstrates resistance against correctness, unforgeability, blindness, unlinkability, and its resilience against quantum polynomial-time (QPT) adversaries under Module-SIS and Module-LWE assumptions. A full implementation on Hyperledger Fabric shows that, under growing network size, proposed PQ-ABS framework reduces verification latency by up to 71%, improves throughput by 62%, and maintains stable performance as the blockchain scales, confirming both its security and efficiency for real-time BIoMT environments.
支持区块链的医疗物联网(BIoMT)系统需要安全和匿名的身份验证。然而,现有的机制依赖于经典的密码学,这变得容易受到量子攻击。这就产生了对后量子安全身份验证的迫切需求,这种身份验证既可以保持匿名性,又可以在大规模部署中保持轻量级。为了解决这一差距,我们提出了一种基于模块-晶格的后量子聚合盲签名(PQ-ABS)方案,该方案结合了消息盲性、签名聚合和模块- lwe硬度来实现匿名和抗量子认证。该方案集成了一个轻量级的区块链架构,该架构将来自分布式医疗实体的多个签名聚合到一个紧凑的证明中,随着节点数量的增加,大大降低了验证开销。形式分析证明了在Module-SIS和Module-LWE假设下对正确性、不可伪造性、盲目性、不可链接性的抵抗,以及它对量子多项式时间(QPT)对手的弹性。在Hyperledger Fabric上的全面实现表明,在不断增长的网络规模下,PQ-ABS框架将验证延迟降低了71%,吞吐量提高了62%,并且随着区块链的扩展保持稳定的性能,验证了其在实时生物技术环境中的安全性和效率。
{"title":"PQ-ABS: Post-Quantum Aggregate Blind Signature-Based Anonymous Authentication for Blockchain-Enabled IoMT","authors":"Arman Ahmad;S. Jagatheswari","doi":"10.1109/TIFS.2026.3657031","DOIUrl":"10.1109/TIFS.2026.3657031","url":null,"abstract":"Blockchain-enabled Internet of Medical Things (BIoMT) systems require secure and anonymous authentication. However, existing mechanisms rely on classical cryptography, which becomes vulnerable to quantum attacks. This creates a critical need for post-quantum secure authentication that can preserve anonymity while remaining lightweight for large-scale deployments. To address this gap, we propose a module-lattice based Post-Quantum Aggregate Blind Signature (PQ-ABS) scheme that combines message blindness, signature aggregation, and Module-LWE hardness to achieve anonymous and quantum-resistant authentication. The scheme integrates with a lightweight blockchain architecture in which multiple signatures from distributed medical entities are aggregated into a single compact proof, significantly reducing verification overhead as the number of nodes increases. Formal analysis demonstrates resistance against correctness, unforgeability, blindness, unlinkability, and its resilience against quantum polynomial-time (QPT) adversaries under Module-SIS and Module-LWE assumptions. A full implementation on Hyperledger Fabric shows that, under growing network size, proposed PQ-ABS framework reduces verification latency by up to 71%, improves throughput by 62%, and maintains stable performance as the blockchain scales, confirming both its security and efficiency for real-time BIoMT environments.","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"21 ","pages":"1542-1551"},"PeriodicalIF":8.0,"publicationDate":"2026-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146043058","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Efficient Revocable Conditional Anonymous Authentication with Verifiable Self-Generated Pseudonyms for VANETs 基于可验证自生成假名的高效可撤销条件匿名认证
IF 6.8 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2026-01-23 DOI: 10.1109/tifs.2026.3657109
Shuqin Luo, Xuelin Cao, Xinghua Li, Zhe Ren, Yunwei Wang, Yinbin Miao
{"title":"Efficient Revocable Conditional Anonymous Authentication with Verifiable Self-Generated Pseudonyms for VANETs","authors":"Shuqin Luo, Xuelin Cao, Xinghua Li, Zhe Ren, Yunwei Wang, Yinbin Miao","doi":"10.1109/tifs.2026.3657109","DOIUrl":"https://doi.org/10.1109/tifs.2026.3657109","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"287 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2026-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146043061","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
PHANTOM: Power Hammering Attack and Countermeasure on Multi-Tenant ReRAM Compute-in-Memory Accelerators 幻影:多租户ReRAM内存计算加速器的功率锤击攻击与对策
IF 6.8 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2026-01-23 DOI: 10.1109/tifs.2026.3657612
Ashish Reddy Bommana, Rajendra Bishnoi, Naghmeh Karimi, Farshad Firouzi, Krishnendu Chakrabarty
{"title":"PHANTOM: Power Hammering Attack and Countermeasure on Multi-Tenant ReRAM Compute-in-Memory Accelerators","authors":"Ashish Reddy Bommana, Rajendra Bishnoi, Naghmeh Karimi, Farshad Firouzi, Krishnendu Chakrabarty","doi":"10.1109/tifs.2026.3657612","DOIUrl":"https://doi.org/10.1109/tifs.2026.3657612","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"57 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2026-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146043056","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cross-Region Feature Reformer with Semantic Preservation for Adversarial Malware Detection 基于语义保留的跨区域特征重构对抗性恶意软件检测
IF 6.8 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2026-01-23 DOI: 10.1109/tifs.2026.3657117
Qian Li, Di Wu, Chenhao Lin, Shuai Liu, Cong Wang, Chao Shen
{"title":"Cross-Region Feature Reformer with Semantic Preservation for Adversarial Malware Detection","authors":"Qian Li, Di Wu, Chenhao Lin, Shuai Liu, Cong Wang, Chao Shen","doi":"10.1109/tifs.2026.3657117","DOIUrl":"https://doi.org/10.1109/tifs.2026.3657117","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"40 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2026-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146043060","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Axial-View-Oriented Contrastive Adversarial Training for Robust Point Cloud Recognition 面向轴向视角的鲁棒点云识别对比对抗训练
IF 6.8 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2026-01-22 DOI: 10.1109/tifs.2026.3657043
Jie Gui, Yu-Xin Zhang, Xiaofeng Cong, Baosheng Yu, Zhipeng Gui, Yuan Yan Tang, James Tin-Yau Kwok
{"title":"Axial-View-Oriented Contrastive Adversarial Training for Robust Point Cloud Recognition","authors":"Jie Gui, Yu-Xin Zhang, Xiaofeng Cong, Baosheng Yu, Zhipeng Gui, Yuan Yan Tang, James Tin-Yau Kwok","doi":"10.1109/tifs.2026.3657043","DOIUrl":"https://doi.org/10.1109/tifs.2026.3657043","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"40 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2026-01-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146043078","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multi-Leader Byzantine Fault Tolerance in Blockchain: Performance and Security b区块链中的多领导拜占庭容错:性能和安全性
IF 6.8 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2026-01-22 DOI: 10.1109/tifs.2026.3657099
Yizhong Liu, Boyu Zhao, Mingzhe Zhai, Xun Lin, Chenhao Ying, Zhenyu Guan, Dawei Li, Qianhong Wu, Jianwei Liu, Willy Susilo, Robert H. Deng
{"title":"Multi-Leader Byzantine Fault Tolerance in Blockchain: Performance and Security","authors":"Yizhong Liu, Boyu Zhao, Mingzhe Zhai, Xun Lin, Chenhao Ying, Zhenyu Guan, Dawei Li, Qianhong Wu, Jianwei Liu, Willy Susilo, Robert H. Deng","doi":"10.1109/tifs.2026.3657099","DOIUrl":"https://doi.org/10.1109/tifs.2026.3657099","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"68 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2026-01-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146043081","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secret Sharing Schemes from Correlated Random Variables and Rate-Limited Public Communication 基于相关随机变量和限速公共通信的秘密共享方案
IF 6.8 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2026-01-22 DOI: 10.1109/tifs.2026.3657030
Rumia Sultana, Rémi A. Chou
{"title":"Secret Sharing Schemes from Correlated Random Variables and Rate-Limited Public Communication","authors":"Rumia Sultana, Rémi A. Chou","doi":"10.1109/tifs.2026.3657030","DOIUrl":"https://doi.org/10.1109/tifs.2026.3657030","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"3 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2026-01-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146043079","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Private Protocol Reverse Engineering via Self-Supervised Learning-Based Message Segmentation 基于自监督学习的消息分割私有协议逆向工程
IF 8 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2026-01-22 DOI: 10.1109/TIFS.2026.3657097
Junchen Li;Guang Cheng;Huimin Tang;Ying Hu;Qinghua Shang
Private protocol reverse engineering is the main way to solve the problem of unknown traffic which brings huge security risks to the current network environment. The network traffic-based protocol reverse engineering approaches are the basis of traffic security supervision and are also widely used and flexible. These approaches utilize multiple algorithms from different perspectives to extract the protocol specifications from messages, but they fail to recognize the importance of message segmentation and do not adequately evaluate the relation of adjacent bytes, leading to imprecise performance. To address these issues, we propose the SLMSP, a self-supervised learning-based message segmentation approach for private protocol reverse engineering in this paper. SLMSP mines the rich information embedded in the word order and word semantics between adjacent bytes through self-supervised learning, and then makes optimal decisions about where the message should be segmented based on the fusion of those information, combing the horizontal inference and vertical correction. After that, SLMSP extracts protocol formats based on fine-grained message segmentation by introducing the progressive sequence merging algorithm. We conduct comprehensive experiments to demonstrate the effectiveness of SLMSP. The experimental results demonstrate that SLMSP achieves the ideal performance both in message segmentation and format inference, and it also has advantages over previous works.
私有协议逆向工程是解决未知流量问题的主要途径,未知流量给当前网络环境带来了巨大的安全风险。基于网络流量的协议逆向工程方法是流量安全监管的基础,具有广泛的应用前景和灵活性。这些方法从不同的角度利用多种算法从消息中提取协议规范,但它们没有认识到消息分段的重要性,也没有充分评估相邻字节的关系,导致性能不精确。为了解决这些问题,我们提出了SLMSP,一种基于自监督学习的私有协议逆向工程消息分割方法。SLMSP通过自监督学习挖掘嵌入在相邻字节之间的词序和语义中的丰富信息,然后在这些信息融合的基础上,结合水平推理和垂直校正,对消息的分割位置做出最优决策。然后,通过引入渐进式序列合并算法,基于细粒度消息分割提取协议格式。我们进行了全面的实验来证明SLMSP的有效性。实验结果表明,SLMSP在消息分割和格式推断方面都取得了理想的性能,并且与以往的研究成果相比具有一定的优势。
{"title":"Private Protocol Reverse Engineering via Self-Supervised Learning-Based Message Segmentation","authors":"Junchen Li;Guang Cheng;Huimin Tang;Ying Hu;Qinghua Shang","doi":"10.1109/TIFS.2026.3657097","DOIUrl":"10.1109/TIFS.2026.3657097","url":null,"abstract":"Private protocol reverse engineering is the main way to solve the problem of unknown traffic which brings huge security risks to the current network environment. The network traffic-based protocol reverse engineering approaches are the basis of traffic security supervision and are also widely used and flexible. These approaches utilize multiple algorithms from different perspectives to extract the protocol specifications from messages, but they fail to recognize the importance of message segmentation and do not adequately evaluate the relation of adjacent bytes, leading to imprecise performance. To address these issues, we propose the SLMSP, a self-supervised learning-based message segmentation approach for private protocol reverse engineering in this paper. SLMSP mines the rich information embedded in the word order and word semantics between adjacent bytes through self-supervised learning, and then makes optimal decisions about where the message should be segmented based on the fusion of those information, combing the horizontal inference and vertical correction. After that, SLMSP extracts protocol formats based on fine-grained message segmentation by introducing the progressive sequence merging algorithm. We conduct comprehensive experiments to demonstrate the effectiveness of SLMSP. The experimental results demonstrate that SLMSP achieves the ideal performance both in message segmentation and format inference, and it also has advantages over previous works.","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"21 ","pages":"1926-1940"},"PeriodicalIF":8.0,"publicationDate":"2026-01-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146043080","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Match on My Own: Fine-Grained Bilateral Access Control with Self-Constrained Matching for Online Social Networks 自我匹配:基于自约束匹配的在线社交网络细粒度双边访问控制
IF 6.8 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2026-01-22 DOI: 10.1109/tifs.2026.3657093
Hua Deng, Letian Sha, Hui Yin, Zheng Qin, Yuying Liu
{"title":"Match on My Own: Fine-Grained Bilateral Access Control with Self-Constrained Matching for Online Social Networks","authors":"Hua Deng, Letian Sha, Hui Yin, Zheng Qin, Yuying Liu","doi":"10.1109/tifs.2026.3657093","DOIUrl":"https://doi.org/10.1109/tifs.2026.3657093","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"29 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2026-01-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146043075","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secure and Customized Data Sharing with Identical Sub-Policy and Bilateral Access Control 具有相同子策略和双边访问控制的安全自定义数据共享
IF 6.8 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2026-01-22 DOI: 10.1109/tifs.2026.3657105
Fuyuan Song, Chuan Zhang, Zhangjie Fu, Meng Li, Zheng Qin, Liehuang Zhu
{"title":"Secure and Customized Data Sharing with Identical Sub-Policy and Bilateral Access Control","authors":"Fuyuan Song, Chuan Zhang, Zhangjie Fu, Meng Li, Zheng Qin, Liehuang Zhu","doi":"10.1109/tifs.2026.3657105","DOIUrl":"https://doi.org/10.1109/tifs.2026.3657105","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"17 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2026-01-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146043082","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
IEEE Transactions on Information Forensics and Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1