首页 > 最新文献

2006 IEEE Information Assurance Workshop最新文献

英文 中文
Securing Ad Hoc Networks with "Asymmetric" Probabilistic Key Predistribution Schemes 用“非对称”概率密钥预分配方案保护Ad Hoc网络
Pub Date : 2006-06-21 DOI: 10.1109/IAW.2006.1652108
Mahalingam Ramkumar
We present two "asymmetric" probabilistic key predistribution schemes to cater for mutual authentication and broadcast authentication respectively. The schemes however employ only symmetric cryptographic primitives - the asymmetry is due to the use of different secrets for encryption/authentication and decryption/verification, which are however related through a one-way function. Both schemes try to take advantage of an abundant and inexpensive resource, storage, to improve their security. While both schemes can have a wide range of applications, we limit ourselves to their utility in securing multi-hop ad hoc networks
我们提出了两种“非对称”概率密钥预分发方案,分别用于相互认证和广播认证。然而,这些方案只采用对称密码原语——这种不对称是由于加密/认证和解密/验证使用不同的秘密,而这些秘密是通过单向函数相关的。这两种方案都试图利用丰富而廉价的资源——存储——来提高安全性。虽然这两种方案都有广泛的应用,但我们仅限于它们在保护多跳自组织网络方面的效用
{"title":"Securing Ad Hoc Networks with \"Asymmetric\" Probabilistic Key Predistribution Schemes","authors":"Mahalingam Ramkumar","doi":"10.1109/IAW.2006.1652108","DOIUrl":"https://doi.org/10.1109/IAW.2006.1652108","url":null,"abstract":"We present two \"asymmetric\" probabilistic key predistribution schemes to cater for mutual authentication and broadcast authentication respectively. The schemes however employ only symmetric cryptographic primitives - the asymmetry is due to the use of different secrets for encryption/authentication and decryption/verification, which are however related through a one-way function. Both schemes try to take advantage of an abundant and inexpensive resource, storage, to improve their security. While both schemes can have a wide range of applications, we limit ourselves to their utility in securing multi-hop ad hoc networks","PeriodicalId":326306,"journal":{"name":"2006 IEEE Information Assurance Workshop","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123198607","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
An Integrated Visualisation Framework for Intrusion Detection 入侵检测集成可视化框架
Pub Date : 2006-06-21 DOI: 10.1109/IAW.2006.1652105
H. Read, A. Blyth
This paper builds upon earlier work (H. Read, 2005), (N. Avourdiadis, 2005) regarding the need for advanced visualisation techniques applied within the intrusion detection arena. Individual visualisation tools can tell us a lot about the way different attacks have been initiated, but we cannot pass interesting sets of data from one tool to another to get a different perspective on the attack. While much work has concentrated on novel visualisation techniques, we explore ways to bring different tools together to work seamlessly with one another. This research explores the need for a framework upon which different visualisation tools can sit and communicate with one another to aid analysts in the intrusion detection process. In this paper we present our ideas and our proposition for the framework
本文建立在早期的工作(H. Read, 2005), (N. Avourdiadis, 2005)关于需要在入侵检测领域应用高级可视化技术的基础上。单个可视化工具可以告诉我们很多关于不同攻击发起方式的信息,但我们无法将有趣的数据集从一个工具传递到另一个工具,以获得对攻击的不同视角。虽然很多工作都集中在新颖的可视化技术上,但我们也在探索将不同的工具结合在一起,以便彼此无缝协作的方法。本研究探讨了对一个框架的需求,在这个框架上,不同的可视化工具可以坐在一起,相互交流,以帮助分析人员进行入侵检测过程。在本文中,我们提出了我们的想法和我们对框架的主张
{"title":"An Integrated Visualisation Framework for Intrusion Detection","authors":"H. Read, A. Blyth","doi":"10.1109/IAW.2006.1652105","DOIUrl":"https://doi.org/10.1109/IAW.2006.1652105","url":null,"abstract":"This paper builds upon earlier work (H. Read, 2005), (N. Avourdiadis, 2005) regarding the need for advanced visualisation techniques applied within the intrusion detection arena. Individual visualisation tools can tell us a lot about the way different attacks have been initiated, but we cannot pass interesting sets of data from one tool to another to get a different perspective on the attack. While much work has concentrated on novel visualisation techniques, we explore ways to bring different tools together to work seamlessly with one another. This research explores the need for a framework upon which different visualisation tools can sit and communicate with one another to aid analysts in the intrusion detection process. In this paper we present our ideas and our proposition for the framework","PeriodicalId":326306,"journal":{"name":"2006 IEEE Information Assurance Workshop","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133022979","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Allowing Finer Control Over Privacy Using Trust as a Benchmark 以信任为基准,对隐私进行更精细的控制
Pub Date : 2006-06-21 DOI: 10.1109/IAW.2006.1652082
Sudip Chakraborty, Indrajit Ray
Every time a user conducts an electronic transaction over the Internet a wealth of personal information is revealed, either voluntarily or involuntarily. This causes serious breach of privacy for the user, in particular, if the personally identifying information is misused by the other users present in the network. Ideally, therefore, the user would like to have a considerable degree of control over what personal information to reveal and to whom. Researchers have proposed models to allow a user to determine what personal information to reveal while doing a transaction over the Internet. However, these models do not help the user in determining who to trust, how much to trust and why to trust them with the personal information. The models fail to address loss of privacy through the misuse of information. In this paper we propose a privacy enhancing trust model to measure the degree of confidence that a user can have in the context of preservation of her privacy during a transaction. The model considers several factor while computing trust which include a user's own experience and knowledge about the target user and feedback obtained from groups of peer users called 'trusted neighbors' and 'friends'. The proposed scheme provides a flexible and powerful approach for the secure handling of private data and offers a user considerable control over how she wishes to disseminate her personal data
每次用户在互联网上进行电子交易时,都会有意无意地泄露大量个人信息。这对用户的隐私造成了严重的侵犯,特别是如果个人识别信息被网络上的其他用户滥用。因此,在理想情况下,用户希望能够在一定程度上控制要向谁透露哪些个人信息。研究人员提出了一些模型,允许用户在互联网上进行交易时决定要透露哪些个人信息。然而,这些模型并不能帮助用户决定信任谁,信任多少以及为什么要信任他们的个人信息。这些模型未能解决因信息滥用而导致的隐私丧失问题。在本文中,我们提出了一个隐私增强信任模型来衡量用户在交易过程中对其隐私保护的信任程度。该模型在计算信任时考虑了几个因素,包括用户自己对目标用户的经验和知识,以及从称为“可信邻居”和“朋友”的对等用户群体获得的反馈。建议的方案为安全处理私人资料提供了一种灵活而有力的方法,并让用户可以在很大程度上控制自己希望如何传播自己的个人资料
{"title":"Allowing Finer Control Over Privacy Using Trust as a Benchmark","authors":"Sudip Chakraborty, Indrajit Ray","doi":"10.1109/IAW.2006.1652082","DOIUrl":"https://doi.org/10.1109/IAW.2006.1652082","url":null,"abstract":"Every time a user conducts an electronic transaction over the Internet a wealth of personal information is revealed, either voluntarily or involuntarily. This causes serious breach of privacy for the user, in particular, if the personally identifying information is misused by the other users present in the network. Ideally, therefore, the user would like to have a considerable degree of control over what personal information to reveal and to whom. Researchers have proposed models to allow a user to determine what personal information to reveal while doing a transaction over the Internet. However, these models do not help the user in determining who to trust, how much to trust and why to trust them with the personal information. The models fail to address loss of privacy through the misuse of information. In this paper we propose a privacy enhancing trust model to measure the degree of confidence that a user can have in the context of preservation of her privacy during a transaction. The model considers several factor while computing trust which include a user's own experience and knowledge about the target user and feedback obtained from groups of peer users called 'trusted neighbors' and 'friends'. The proposed scheme provides a flexible and powerful approach for the secure handling of private data and offers a user considerable control over how she wishes to disseminate her personal data","PeriodicalId":326306,"journal":{"name":"2006 IEEE Information Assurance Workshop","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132149962","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
The Design and Use of Interactive Visualization Applets for Teaching Ciphers 密码教学交互式可视化小程序的设计与应用
Pub Date : 2006-06-21 DOI: 10.1109/IAW.2006.1652079
D. Schweitzer, L. Baird
Cryptography is a fundamental topic in an information assurance curriculum. Students should understand the basic concepts and weaknesses of both historical and current cipher algorithms. Visualization tools can help students understand these concepts, both in the classroom and as out-of-class exercises. This paper describes a set of such tools designed for a cryptography course at the United States Air Force Academy. The design goals, implementation details, and classroom experiences are addressed
密码学是信息保障课程中的一个基本主题。学生应该了解历史和当前密码算法的基本概念和弱点。可视化工具可以帮助学生理解这些概念,无论是在课堂上还是课外练习中。本文描述了为美国空军学院的密码学课程设计的一套这样的工具。讨论了设计目标、实现细节和课堂体验
{"title":"The Design and Use of Interactive Visualization Applets for Teaching Ciphers","authors":"D. Schweitzer, L. Baird","doi":"10.1109/IAW.2006.1652079","DOIUrl":"https://doi.org/10.1109/IAW.2006.1652079","url":null,"abstract":"Cryptography is a fundamental topic in an information assurance curriculum. Students should understand the basic concepts and weaknesses of both historical and current cipher algorithms. Visualization tools can help students understand these concepts, both in the classroom and as out-of-class exercises. This paper describes a set of such tools designed for a cryptography course at the United States Air Force Academy. The design goals, implementation details, and classroom experiences are addressed","PeriodicalId":326306,"journal":{"name":"2006 IEEE Information Assurance Workshop","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128422837","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 38
Design and Implementation of a File Transfer and Web Services Guard Employing Cryptographically Secured XML Security Labels 采用加密保护XML安全标签的文件传输和Web服务保护的设计与实现
Pub Date : 2006-06-21 DOI: 10.1109/IAW.2006.1652073
Andreas Thümmel, K. Eckstein
This publication introduces the concept of cryptographically secured, extensible markup language (XML) based security labels, which either globally label any non-XML electronic document, or label individual sections of an XML infoset. It further describes the architecture and construction of a guard prototype for file transfer and Web services based applications. This prototype employs the XML security labels to verify information classification prior to releasing information across a security domain boundary separating enclaves belonging to different security domains. If necessary, XML infosets containing information at multiple security levels can be redacted by the guard filtering algorithms to create a releasable subset of the original XML infoset or document
本出版物介绍了加密保护的、基于可扩展标记语言(XML)的安全标签的概念,这些安全标签可以全局标记任何非XML电子文档,也可以标记XML信息集的各个部分。它进一步描述了用于文件传输和基于Web服务的应用程序的保护原型的体系结构和构造。该原型在跨安全域边界发布信息之前,使用XML安全标签验证信息分类,该安全域边界将属于不同安全域的飞地分开。如果有必要,可以通过保护过滤算法编辑包含多个安全级别信息的XML信息集,以创建原始XML信息集或文档的可发布子集
{"title":"Design and Implementation of a File Transfer and Web Services Guard Employing Cryptographically Secured XML Security Labels","authors":"Andreas Thümmel, K. Eckstein","doi":"10.1109/IAW.2006.1652073","DOIUrl":"https://doi.org/10.1109/IAW.2006.1652073","url":null,"abstract":"This publication introduces the concept of cryptographically secured, extensible markup language (XML) based security labels, which either globally label any non-XML electronic document, or label individual sections of an XML infoset. It further describes the architecture and construction of a guard prototype for file transfer and Web services based applications. This prototype employs the XML security labels to verify information classification prior to releasing information across a security domain boundary separating enclaves belonging to different security domains. If necessary, XML infosets containing information at multiple security levels can be redacted by the guard filtering algorithms to create a releasable subset of the original XML infoset or document","PeriodicalId":326306,"journal":{"name":"2006 IEEE Information Assurance Workshop","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124423880","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Covert Timing Channel Analysis of Rate Monotonic Real-Time Scheduling Algorithm in MLS Systems MLS系统中速率单调实时调度算法的隐蔽时序信道分析
Pub Date : 2006-06-21 DOI: 10.1109/IAW.2006.1652117
J. Alves-Foss
The modern digital battlesphere requires the development and deployment of multi-level secure computing systems and networks. A portion of these systems are necessarily be operating under real-time processing constraints. High assurance systems processing national security information must be analyzed for possible information leakages, including covert channels. In this paper we provide a mathematical framework for examining the impact the rate-monotonic real-time scheduling algorithm has on covert timing channels. We prove that in some system configurations, it would not be possible to completely close the covert channel due to the rate-monotonic timing constraints. In addition, we propose a simple method to formulate a security metric to compare covert channels in terms of the relative amount of possible information leakage
现代数字战场要求多级安全计算系统和网络的发展和部署。这些系统的一部分必须在实时处理约束下运行。必须分析处理国家安全信息的高保障系统是否有可能泄露信息,包括秘密渠道。在本文中,我们提供了一个数学框架来研究速率单调实时调度算法对隐蔽时序信道的影响。我们证明了在某些系统配置中,由于速率单调时序约束,不可能完全关闭隐蔽信道。此外,我们提出了一种简单的方法来制定安全度量,以比较隐蔽通道在可能的信息泄漏方面的相对数量
{"title":"Covert Timing Channel Analysis of Rate Monotonic Real-Time Scheduling Algorithm in MLS Systems","authors":"J. Alves-Foss","doi":"10.1109/IAW.2006.1652117","DOIUrl":"https://doi.org/10.1109/IAW.2006.1652117","url":null,"abstract":"The modern digital battlesphere requires the development and deployment of multi-level secure computing systems and networks. A portion of these systems are necessarily be operating under real-time processing constraints. High assurance systems processing national security information must be analyzed for possible information leakages, including covert channels. In this paper we provide a mathematical framework for examining the impact the rate-monotonic real-time scheduling algorithm has on covert timing channels. We prove that in some system configurations, it would not be possible to completely close the covert channel due to the rate-monotonic timing constraints. In addition, we propose a simple method to formulate a security metric to compare covert channels in terms of the relative amount of possible information leakage","PeriodicalId":326306,"journal":{"name":"2006 IEEE Information Assurance Workshop","volume":"20 15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116718767","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 45
Safely Redistributing Untrusted Code using .NET 使用。net安全地重新分发不受信任的代码
Pub Date : 2006-06-21 DOI: 10.1109/IAW.2006.1652113
Net, M. Carlisle, J. Humphries, J. Hamilton
Reusing software components is a textbook software engineering best practice. Developers reuse components written by others, combining them in unique ways to create new software products. Reusing software components can create a significant security risk, as these reused components may behave badly, either by malicious intent or negligence on the part of their authors. The .NET framework provides fine-grained mechanisms for specifying how software should be trusted. Permissions are granted based on the source of software, and where it currently resides (on the local disk, or in a particular internet zone). Unfortunately, these trust guarantees are difficult to manage, and there is no guarantee that an end-user receiving a redistributed untrusted component would correctly set its trust level. We propose a framework with a set of easily understood trust levels, and a simple mechanism for applying these trust levels both to already-compiled applications and libraries within the .NET framework. This allows both end-users and software developers to leverage the work of others, while maintaining guarantees that this software would not, intentionally or otherwise, cause damage to their systems or leak confidential information. This tool should provide significant opportunities for code reuse with security and should be easily extended to handle related applications, such as those using compiled Java class libraries
重用软件组件是教科书式的软件工程最佳实践。开发人员重用其他人编写的组件,以独特的方式组合它们以创建新的软件产品。重用软件组件可能会产生重大的安全风险,因为这些被重用的组件可能由于恶意意图或其作者的疏忽而表现不佳。. net框架提供了细粒度的机制来指定软件应该如何被信任。权限的授予是基于软件的来源及其当前所在的位置(在本地磁盘上,或在特定的internet区域中)。不幸的是,这些信任保证很难管理,并且不能保证接收重新分发的不受信任组件的最终用户将正确设置其信任级别。我们提出了一个框架,其中包含一组易于理解的信任级别,以及一个简单的机制,用于将这些信任级别应用于。net框架中已编译的应用程序和库。这允许最终用户和软件开发人员利用其他人的工作,同时保证该软件不会有意或无意地对他们的系统造成损害或泄露机密信息。这个工具应该为代码的安全重用提供重要的机会,并且应该很容易扩展以处理相关的应用程序,例如那些使用编译Java类库的应用程序
{"title":"Safely Redistributing Untrusted Code using .NET","authors":"Net, M. Carlisle, J. Humphries, J. Hamilton","doi":"10.1109/IAW.2006.1652113","DOIUrl":"https://doi.org/10.1109/IAW.2006.1652113","url":null,"abstract":"Reusing software components is a textbook software engineering best practice. Developers reuse components written by others, combining them in unique ways to create new software products. Reusing software components can create a significant security risk, as these reused components may behave badly, either by malicious intent or negligence on the part of their authors. The .NET framework provides fine-grained mechanisms for specifying how software should be trusted. Permissions are granted based on the source of software, and where it currently resides (on the local disk, or in a particular internet zone). Unfortunately, these trust guarantees are difficult to manage, and there is no guarantee that an end-user receiving a redistributed untrusted component would correctly set its trust level. We propose a framework with a set of easily understood trust levels, and a simple mechanism for applying these trust levels both to already-compiled applications and libraries within the .NET framework. This allows both end-users and software developers to leverage the work of others, while maintaining guarantees that this software would not, intentionally or otherwise, cause damage to their systems or leak confidential information. This tool should provide significant opportunities for code reuse with security and should be easily extended to handle related applications, such as those using compiled Java class libraries","PeriodicalId":326306,"journal":{"name":"2006 IEEE Information Assurance Workshop","volume":"32 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125708968","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The CyberDefense Laboratory: A Framework for Information Security Education 网络防御实验室:信息安全教育框架
Pub Date : 2006-06-21 DOI: 10.1109/IAW.2006.1652077
M. Aboutabl
We developed a two-semester curriculum for undergraduate information security education. In the first semester students are provided with the necessary background in cryptography and cryptographic protocols, network security threats and defense mechanisms, as well as an overview of various security models. In the second semester, a set of laboratory-based modules provides the students with hands-on experience in implementing several of the security mechanisms they have learned so far. These modules cover topics such as host discovery and scanning, security assessment, perimeter security, secure communication, and Web security. The students finally engage in an attack-defense exercise through which they gain more insight into the vulnerabilities of existing platforms, and thus mitigate them. A dedicated laboratory has been established for this purpose. The setup of the laboratory and the pedagogical modules are described in this paper
我们为本科信息安全教育制定了两个学期的课程。在第一学期,学生将获得密码学和密码学协议、网络安全威胁和防御机制的必要背景知识,以及各种安全模型的概述。在第二学期,一组基于实验室的模块为学生提供了实现目前所学的几种安全机制的实践经验。这些模块涵盖了主机发现和扫描、安全评估、外围安全、安全通信和Web安全等主题。学生们最后参与了一个攻击防御练习,通过这个练习,他们对现有平台的漏洞有了更多的了解,从而减轻了这些漏洞。为此目的设立了一个专门的实验室。本文介绍了实验室的设置和教学模块
{"title":"The CyberDefense Laboratory: A Framework for Information Security Education","authors":"M. Aboutabl","doi":"10.1109/IAW.2006.1652077","DOIUrl":"https://doi.org/10.1109/IAW.2006.1652077","url":null,"abstract":"We developed a two-semester curriculum for undergraduate information security education. In the first semester students are provided with the necessary background in cryptography and cryptographic protocols, network security threats and defense mechanisms, as well as an overview of various security models. In the second semester, a set of laboratory-based modules provides the students with hands-on experience in implementing several of the security mechanisms they have learned so far. These modules cover topics such as host discovery and scanning, security assessment, perimeter security, secure communication, and Web security. The students finally engage in an attack-defense exercise through which they gain more insight into the vulnerabilities of existing platforms, and thus mitigate them. A dedicated laboratory has been established for this purpose. The setup of the laboratory and the pedagogical modules are described in this paper","PeriodicalId":326306,"journal":{"name":"2006 IEEE Information Assurance Workshop","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128483232","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
期刊
2006 IEEE Information Assurance Workshop
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1