首页 > 最新文献

2009 Fifth International Conference on Information Assurance and Security最新文献

英文 中文
Efficient Certificate-Based Signature Scheme 高效的证书签名方案
Pub Date : 2009-08-18 DOI: 10.1109/IAS.2009.62
Yang Ming, Yumin Wang
In this paper, we give the secure model of certificate-based signature (CBS) and propose an efficient CBS scheme. The proposed scheme is shown to be existentially unforgeable against adaptive chosen message and identity attacks under the discrete logarithm assumption in the random oracle model. Compared with the schemes in RSA 2004 and in EuroPKI 2007, no pairing computation and the special MapToPoint hash function is needed in all phase, and hence,our scheme is more efficient.
本文给出了基于证书签名(CBS)的安全模型,并提出了一种高效的CBS方案。在随机oracle模型中,在离散对数假设下,该方案对自适应选择消息和身份攻击具有存在不可伪造性。与RSA 2004和EuroPKI 2007方案相比,该方案在所有阶段都不需要配对计算和特殊的maptoppoint哈希函数,因此该方案的效率更高。
{"title":"Efficient Certificate-Based Signature Scheme","authors":"Yang Ming, Yumin Wang","doi":"10.1109/IAS.2009.62","DOIUrl":"https://doi.org/10.1109/IAS.2009.62","url":null,"abstract":"In this paper, we give the secure model of certificate-based signature (CBS) and propose an efficient CBS scheme. The proposed scheme is shown to be existentially unforgeable against adaptive chosen message and identity attacks under the discrete logarithm assumption in the random oracle model. Compared with the schemes in RSA 2004 and in EuroPKI 2007, no pairing computation and the special MapToPoint hash function is needed in all phase, and hence,our scheme is more efficient.","PeriodicalId":240354,"journal":{"name":"2009 Fifth International Conference on Information Assurance and Security","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127742849","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
GOP-Level Transmission Distortion Modeling for Video Streaming over Mobile Networks 移动网络视频流的gop级传输失真建模
Pub Date : 2009-08-18 DOI: 10.1109/IAS.2009.107
Yu Han, Aidong Men, Kan Chang, Ziyi Quan
A major challenge in video coding and transmission over mobile networks is that the wireless channel is error-prone and the channel resources are limited. In this work, we analyze the picture distortion caused by channel errors and the distortion propagation behavior in its subsequent frames along the motion prediction path. We propose a linear fitting approach algorithm to achieve a low complexity GOP-level transmission distortion modeling. It is a predictive modeling which allows the encoder to predict the transmission distortion before the whole GOP is compressed and transmitted. The simulation results demonstrate that the proposed modeling has low computational complexity and high accuracy. It can be used in allocating the limited channel resources optimally for mobile video applications.
在移动网络上进行视频编码和传输的一个主要挑战是无线信道容易出错和信道资源有限。在这项工作中,我们分析了由信道误差引起的图像失真以及沿运动预测路径在其后续帧中的失真传播行为。我们提出了一种线性拟合算法来实现低复杂度的gop级传输失真建模。它是一种预测模型,允许编码器在整个GOP压缩和传输之前预测传输失真。仿真结果表明,该模型计算复杂度低,精度高。它可以用于对移动视频应用中有限的信道资源进行优化分配。
{"title":"GOP-Level Transmission Distortion Modeling for Video Streaming over Mobile Networks","authors":"Yu Han, Aidong Men, Kan Chang, Ziyi Quan","doi":"10.1109/IAS.2009.107","DOIUrl":"https://doi.org/10.1109/IAS.2009.107","url":null,"abstract":"A major challenge in video coding and transmission over mobile networks is that the wireless channel is error-prone and the channel resources are limited. In this work, we analyze the picture distortion caused by channel errors and the distortion propagation behavior in its subsequent frames along the motion prediction path. We propose a linear fitting approach algorithm to achieve a low complexity GOP-level transmission distortion modeling. It is a predictive modeling which allows the encoder to predict the transmission distortion before the whole GOP is compressed and transmitted. The simulation results demonstrate that the proposed modeling has low computational complexity and high accuracy. It can be used in allocating the limited channel resources optimally for mobile video applications.","PeriodicalId":240354,"journal":{"name":"2009 Fifth International Conference on Information Assurance and Security","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125457797","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An Effective Texture Spectrum Descriptor 一种有效的纹理谱描述符
Pub Date : 2009-08-18 DOI: 10.1109/IAS.2009.126
Xiaosheng Wu, Junding Sun
The center-symmetric local binary pattern (CS-LBP) is an effective extension to local binary pattern (LBP) operator. However, it discards some important texture information because of the ignorance of the center pixel and is hard to choose a threshold for recognizing the flat area. A novel improved CS-LBP operator, named ICS-LBP, is proposed in this paper. The new operator classifies the local pattern based on the relativity of the center pixel and the center-symmetric pixels instead of the gray value differences between the center-symmetric pixels as CS-LBP, which can fully extract the texture information discarded by CS-LBP descriptor. Comparisons are given among the three methods and the experimental results show the performance improvement of the new descriptor.
中心对称局部二元模式(CS-LBP)是局部二元模式(LBP)算子的有效扩展。然而,由于忽略了中心像素,它丢弃了一些重要的纹理信息,并且难以选择识别平坦区域的阈值。提出了一种新的改进CS-LBP算子,即ICS-LBP算子。该算子基于中心像素与中心对称像素之间的相关性对局部模式进行分类,而不是像CS-LBP那样基于中心对称像素之间的灰度值差异对局部模式进行分类,可以充分提取CS-LBP描述符丢弃的纹理信息。对三种方法进行了比较,实验结果表明新描述符的性能有所提高。
{"title":"An Effective Texture Spectrum Descriptor","authors":"Xiaosheng Wu, Junding Sun","doi":"10.1109/IAS.2009.126","DOIUrl":"https://doi.org/10.1109/IAS.2009.126","url":null,"abstract":"The center-symmetric local binary pattern (CS-LBP) is an effective extension to local binary pattern (LBP) operator. However, it discards some important texture information because of the ignorance of the center pixel and is hard to choose a threshold for recognizing the flat area. A novel improved CS-LBP operator, named ICS-LBP, is proposed in this paper. The new operator classifies the local pattern based on the relativity of the center pixel and the center-symmetric pixels instead of the gray value differences between the center-symmetric pixels as CS-LBP, which can fully extract the texture information discarded by CS-LBP descriptor. Comparisons are given among the three methods and the experimental results show the performance improvement of the new descriptor.","PeriodicalId":240354,"journal":{"name":"2009 Fifth International Conference on Information Assurance and Security","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115870083","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
A Support Vector Machines Security Assessment Method Based on Group Decision-Marking for Electric Power Information System 基于群决策的电力信息系统支持向量机安全评估方法
Pub Date : 2009-08-18 DOI: 10.1109/IAS.2009.234
Xiaorong Cheng, Yan Wei, Xin Geng
In accordance with the characteristics and the special demands of electric power information system, this paper designs a support vector machines (SVM) risk assessment method based on group decision-marking. According to security technology indices of electric power information system, the method chooses the mode of expert scoring, based on the group decision-marking, to calculate integrated value of each index, which is as a training sample used to train SVM, and it forecasts risk level for the system. Finally, it verifies the correctness of the method by analyzing results of the examples of the electric power information system security assessment. The experiment shows that the method can not only forecast the current risk level of the electric power system with a high accuracy rate, but also reduce the influence of the subjective factors in some degree.
根据电力信息系统的特点和特殊需求,设计了一种基于群体决策的支持向量机(SVM)风险评估方法。该方法根据电力信息系统的安全技术指标,选择基于群体决策的专家评分模式,计算各指标的综合值,作为训练样本用于训练支持向量机,对系统进行风险等级预测。最后,通过对电力信息系统安全评估实例结果的分析,验证了该方法的正确性。实验表明,该方法不仅能够以较高的准确率预测电力系统的当前风险水平,而且在一定程度上减少了主观因素的影响。
{"title":"A Support Vector Machines Security Assessment Method Based on Group Decision-Marking for Electric Power Information System","authors":"Xiaorong Cheng, Yan Wei, Xin Geng","doi":"10.1109/IAS.2009.234","DOIUrl":"https://doi.org/10.1109/IAS.2009.234","url":null,"abstract":"In accordance with the characteristics and the special demands of electric power information system, this paper designs a support vector machines (SVM) risk assessment method based on group decision-marking. According to security technology indices of electric power information system, the method chooses the mode of expert scoring, based on the group decision-marking, to calculate integrated value of each index, which is as a training sample used to train SVM, and it forecasts risk level for the system. Finally, it verifies the correctness of the method by analyzing results of the examples of the electric power information system security assessment. The experiment shows that the method can not only forecast the current risk level of the electric power system with a high accuracy rate, but also reduce the influence of the subjective factors in some degree.","PeriodicalId":240354,"journal":{"name":"2009 Fifth International Conference on Information Assurance and Security","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132228635","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Detecting DoS and DDoS Attacks Using Chi-Square 使用卡方法检测DoS和DDoS攻击
Pub Date : 2009-08-18 DOI: 10.1109/IAS.2009.292
Fang-Yie Leu, C. Pai
In this paper, we propose an agent_based distributed intrusion detection architecture, which detects DoS/DDoS attacks by comparing source IP addresses’ normal and current connection frequencies. First, we collect source IPs’ packet statistics to obtain their normal packet distribution. When current statistics suddenly increase, very often it is an attack. Experimental results show that this approach can effectively detect DoS/DDoS attacks.
本文提出了一种基于agent_based的分布式入侵检测体系结构,通过比较源IP地址的正常连接频率和当前连接频率来检测DoS/DDoS攻击。首先,我们收集源ip的报文统计,得到它们的正态分布。当当前的统计数据突然增加时,通常是一种攻击。实验结果表明,该方法可以有效地检测到DoS/DDoS攻击。
{"title":"Detecting DoS and DDoS Attacks Using Chi-Square","authors":"Fang-Yie Leu, C. Pai","doi":"10.1109/IAS.2009.292","DOIUrl":"https://doi.org/10.1109/IAS.2009.292","url":null,"abstract":"In this paper, we propose an agent_based distributed intrusion detection architecture, which detects DoS/DDoS attacks by comparing source IP addresses’ normal and current connection frequencies. First, we collect source IPs’ packet statistics to obtain their normal packet distribution. When current statistics suddenly increase, very often it is an attack. Experimental results show that this approach can effectively detect DoS/DDoS attacks.","PeriodicalId":240354,"journal":{"name":"2009 Fifth International Conference on Information Assurance and Security","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132539191","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Cramer-Rao Lower Bound for Non-coherent TOA Estimation with Impulse Signal 脉冲信号下非相干TOA估计的Cramer-Rao下界
Pub Date : 2009-08-18 DOI: 10.1109/IAS.2009.205
Jie Liu, Xiaoji Liu, Lin Zheng
The non-coherent time-of-arrival (TOA) estimations are applied in impulse location for its simplicity. However, the multipath propagation of the narrow pulse results in complicated performance analysis. By fitting the output envelope of energy detection into a exponential decay, we approximately deduce the closed-form Cramer-Rao low bound (CRLB) of TOA estimation. Simulations with non-coherent TOA algorithms, such as threshold crossing (TC) and maximum energy selection (MES), validate the analysis. Furthermore, the integration window and multipath delay spread in ultra-wideband channel are considered to obtain a referable bound.
非相干到达时间(TOA)估计由于其简单性被应用于脉冲定位。然而,窄脉冲的多径传播导致了复杂的性能分析。通过将能量检测的输出包络拟合成指数衰减,我们近似地推导出TOA估计的闭型Cramer-Rao下界(CRLB)。非相干TOA算法的仿真,如阈值交叉(TC)和最大能量选择(MES),验证了分析。此外,还考虑了超宽带信道中的积分窗口和多径延迟扩展,从而得到了一个可参考的边界。
{"title":"Cramer-Rao Lower Bound for Non-coherent TOA Estimation with Impulse Signal","authors":"Jie Liu, Xiaoji Liu, Lin Zheng","doi":"10.1109/IAS.2009.205","DOIUrl":"https://doi.org/10.1109/IAS.2009.205","url":null,"abstract":"The non-coherent time-of-arrival (TOA) estimations are applied in impulse location for its simplicity. However, the multipath propagation of the narrow pulse results in complicated performance analysis. By fitting the output envelope of energy detection into a exponential decay, we approximately deduce the closed-form Cramer-Rao low bound (CRLB) of TOA estimation. Simulations with non-coherent TOA algorithms, such as threshold crossing (TC) and maximum energy selection (MES), validate the analysis. Furthermore, the integration window and multipath delay spread in ultra-wideband channel are considered to obtain a referable bound.","PeriodicalId":240354,"journal":{"name":"2009 Fifth International Conference on Information Assurance and Security","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134272116","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A New Source Address Validation Scheme Based on IBS 一种新的基于IBS的源地址验证方案
Pub Date : 2009-08-18 DOI: 10.1109/IAS.2009.109
Ningning Lu, Huachun Zhou, Hongke Zhang
Source address authentication is very important to change current serious network security situation. In this article, we propose a new source address validation scheme based on IBS algorithm and study its security using SVO logic. We find that our scheme can successfully guarantees authenticity of IP packet’s information source.
源地址认证对于改变当前严重的网络安全状况非常重要。本文提出了一种新的基于IBS算法的源地址验证方案,并利用SVO逻辑对其安全性进行了研究。结果表明,该方案能够很好地保证IP报文信息源的真实性。
{"title":"A New Source Address Validation Scheme Based on IBS","authors":"Ningning Lu, Huachun Zhou, Hongke Zhang","doi":"10.1109/IAS.2009.109","DOIUrl":"https://doi.org/10.1109/IAS.2009.109","url":null,"abstract":"Source address authentication is very important to change current serious network security situation. In this article, we propose a new source address validation scheme based on IBS algorithm and study its security using SVO logic. We find that our scheme can successfully guarantees authenticity of IP packet’s information source.","PeriodicalId":240354,"journal":{"name":"2009 Fifth International Conference on Information Assurance and Security","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134294111","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Generalization of de Weger's Method de Weger方法的推广
Pub Date : 2009-08-18 DOI: 10.1109/IAS.2009.153
Chien-Yuan Chen, C. Hsueh, Yu-Feng Lin
This paper generalizes de Weger's method if the ratio of two RSA primes frac{p}{q} is close to a simple fraction frac{b}{a}.
本文推广了两个RSA素数frac{p}{q}之比接近于一个简单分数frac{b}{a}的de Weger方法。
{"title":"A Generalization of de Weger's Method","authors":"Chien-Yuan Chen, C. Hsueh, Yu-Feng Lin","doi":"10.1109/IAS.2009.153","DOIUrl":"https://doi.org/10.1109/IAS.2009.153","url":null,"abstract":"This paper generalizes de Weger's method if the ratio of two RSA primes frac{p}{q} is close to a simple fraction frac{b}{a}.","PeriodicalId":240354,"journal":{"name":"2009 Fifth International Conference on Information Assurance and Security","volume":"238 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131482860","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Range-Free Fast and Rough Nodes Localization Algorithm in Wireless Sensor Networks 无线传感器网络无距离快速粗糙节点定位算法
Pub Date : 2009-08-18 DOI: 10.1109/IAS.2009.331
Wang Mei, Xiaochuan Sun, Zheng Hao
Localization problems of the WSNs (wireless sensor networks)geostationary nodes are studied,and the localization algorithm (Fast and Rough Nodes Location Algorithm) based on the communication power mediation for geostationary nodes by receiving the localization information from anchor nodes is presented.The localization estimate of localized nodes is executed in lesser field for higher accuracy.The simulation results show that the algorithm has a small amount of communication, high positioning accuracy, balancing payloads, and is suitable for random deployment.
研究了无线传感器网络对地静止节点的定位问题,提出了基于通信功率中介的快速粗糙节点定位算法,该算法通过接收锚节点的定位信息实现对地静止节点的定位。在较小的域内对定位节点进行定位估计,提高了定位精度。仿真结果表明,该算法通信量小,定位精度高,有效载荷均衡,适合随机部署。
{"title":"Range-Free Fast and Rough Nodes Localization Algorithm in Wireless Sensor Networks","authors":"Wang Mei, Xiaochuan Sun, Zheng Hao","doi":"10.1109/IAS.2009.331","DOIUrl":"https://doi.org/10.1109/IAS.2009.331","url":null,"abstract":"Localization problems of the WSNs (wireless sensor networks)geostationary nodes are studied,and the localization algorithm (Fast and Rough Nodes Location Algorithm) based on the communication power mediation for geostationary nodes by receiving the localization information from anchor nodes is presented.The localization estimate of localized nodes is executed in lesser field for higher accuracy.The simulation results show that the algorithm has a small amount of communication, high positioning accuracy, balancing payloads, and is suitable for random deployment.","PeriodicalId":240354,"journal":{"name":"2009 Fifth International Conference on Information Assurance and Security","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131839404","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Nonlocal Curvature-Driven Diffusion Model for Image Inpainting 图像涂抹的非局部曲率驱动扩散模型
Pub Date : 2009-08-18 DOI: 10.1109/IAS.2009.141
Li Li, Han Yu
A nonlocal image inpainting model is proposed by incorporating the nonlocal differential operators into the curvature-driven diffusion model. The new model differs from the original model in that pixels of similar structures rather than pixels in the neighborhood (the case for the original model) are utilized to estimate the lost pixels. This difference makes the new model performs very efficiently in inpainting images, especially textured images.
将非局部微分算子引入到曲率驱动扩散模型中,提出了一种非局部图像涂抹模型。新模型与原始模型的不同之处在于,使用相似结构的像素而不是邻近的像素(原始模型的情况)来估计丢失的像素。这种差异使得新模型在绘制图像时非常有效,特别是纹理图像。
{"title":"Nonlocal Curvature-Driven Diffusion Model for Image Inpainting","authors":"Li Li, Han Yu","doi":"10.1109/IAS.2009.141","DOIUrl":"https://doi.org/10.1109/IAS.2009.141","url":null,"abstract":"A nonlocal image inpainting model is proposed by incorporating the nonlocal differential operators into the curvature-driven diffusion model. The new model differs from the original model in that pixels of similar structures rather than pixels in the neighborhood (the case for the original model) are utilized to estimate the lost pixels. This difference makes the new model performs very efficiently in inpainting images, especially textured images.","PeriodicalId":240354,"journal":{"name":"2009 Fifth International Conference on Information Assurance and Security","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131135198","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
期刊
2009 Fifth International Conference on Information Assurance and Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1