首页 > 最新文献

GeoPrivacy '14最新文献

英文 中文
A spatial entropy-based approach to improve mobile risk-based authentication 基于空间熵的移动风险认证改进方法
Pub Date : 2014-11-04 DOI: 10.1145/2675682.2676400
J. Xiong, J. Xiong, Christophe Claramunt
The research presented in this paper develops a novel approach for a risk-based authentication system that takes into account mobile user movement patterns. Inspired by the concept of Shannon's information theory, we introduce a variant version of spatial entropy vectors embedded with time information as a mathematical modeling tool to evaluate regular movement patterns, and spatial entropy vectors derived from user movements range and paces. To support the approach, several algorithms have been designed and implemented. A prototype iPhone application was developed as a proof-of-concept, user movement data has been collected over a predetermined timeframe by accumulating, merging, and saving spatial entropy vectors in a database on the application. The application simulates risk-based authentication by calculating risk factors based on the similarity between current spatial entropy vectors calculated on demand, and historical distributions of movement patterns. Data collected on the field shows that the risk factor is relatively low for similar moving patterns, while different patterns can yield a higher risk factor. Rather than modeling this process by directly storing GPS location data with complicated path-matching algorithms, the spatial entropy model developed uses sampled location data, but does not keep it, preserving user privacy. Practical applications can be used, for example, to adjust fingerprint authentication threshold in iPhone when combining with the risk factor calculated in real time.
本文提出的研究开发了一种考虑移动用户移动模式的基于风险的认证系统的新方法。受Shannon信息论概念的启发,我们引入了嵌入时间信息的空间熵向量的变体版本,作为评估规则运动模式的数学建模工具,以及来自用户运动范围和速度的空间熵向量。为了支持这种方法,已经设计并实现了几种算法。开发了一个原型iPhone应用程序作为概念验证,通过在应用程序的数据库中积累、合并和保存空间熵向量,在预定的时间范围内收集用户移动数据。该应用程序模拟基于风险的身份验证,基于当前按需计算的空间熵向量与运动模式的历史分布之间的相似性计算风险因素。现场收集的数据表明,相似的移动模式的风险系数相对较低,而不同的移动模式可能产生更高的风险系数。空间熵模型不是通过复杂的路径匹配算法直接存储GPS位置数据来建模这一过程,而是使用采样的位置数据,但不保留它,从而保护了用户隐私。实际应用中,可以结合实时计算的风险系数,调整iPhone的指纹认证阈值。
{"title":"A spatial entropy-based approach to improve mobile risk-based authentication","authors":"J. Xiong, J. Xiong, Christophe Claramunt","doi":"10.1145/2675682.2676400","DOIUrl":"https://doi.org/10.1145/2675682.2676400","url":null,"abstract":"The research presented in this paper develops a novel approach for a risk-based authentication system that takes into account mobile user movement patterns. Inspired by the concept of Shannon's information theory, we introduce a variant version of spatial entropy vectors embedded with time information as a mathematical modeling tool to evaluate regular movement patterns, and spatial entropy vectors derived from user movements range and paces. To support the approach, several algorithms have been designed and implemented. A prototype iPhone application was developed as a proof-of-concept, user movement data has been collected over a predetermined timeframe by accumulating, merging, and saving spatial entropy vectors in a database on the application. The application simulates risk-based authentication by calculating risk factors based on the similarity between current spatial entropy vectors calculated on demand, and historical distributions of movement patterns. Data collected on the field shows that the risk factor is relatively low for similar moving patterns, while different patterns can yield a higher risk factor. Rather than modeling this process by directly storing GPS location data with complicated path-matching algorithms, the spatial entropy model developed uses sampled location data, but does not keep it, preserving user privacy. Practical applications can be used, for example, to adjust fingerprint authentication threshold in iPhone when combining with the risk factor calculated in real time.","PeriodicalId":337858,"journal":{"name":"GeoPrivacy '14","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124315520","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
A grid-based location privacy-preserving method for LBS users 基于网格的LBS用户位置隐私保护方法
Pub Date : 2014-11-04 DOI: 10.1145/2675682.2676398
Lei Mou, A. Lbath
With the availability and rapid development of GPS-enabled mobile devices and the positioning technology, the Location-Based Services (LBS), aiming at providing customized services according to users' spatio-temporal location information, become increasingly popular in many domains. Users are more and more concerned about privacy issues such as the disclosure of their location in one hand. In the other hand they take advantage of the conveniences of LBS in different aspects of their daily lives. Many researches have been conducted in the location cloaking of location privacy, however, the long cloaking time and large cloaked spatial area affected the quality of service. To solve this problem, we propose a grid-based location cloaking method based on k-anonymity model, which is expected to produce better quality of service by reducing the cloaking time and cloaked spatial region.
随着具有gps功能的移动设备和定位技术的普及和快速发展,基于用户时空位置信息提供定制化服务的定位服务(location - based Services, LBS)在许多领域得到越来越广泛的应用。用户越来越关心隐私问题,比如他们的位置暴露在一只手上。另一方面,他们在日常生活的不同方面利用LBS的便利。针对位置隐私的位置隐身进行了大量研究,但隐身时间长,隐身空间面积大,影响了服务质量。为了解决这一问题,我们提出了一种基于k-匿名模型的网格位置隐身方法,该方法通过减少隐身时间和隐身空间区域来提高服务质量。
{"title":"A grid-based location privacy-preserving method for LBS users","authors":"Lei Mou, A. Lbath","doi":"10.1145/2675682.2676398","DOIUrl":"https://doi.org/10.1145/2675682.2676398","url":null,"abstract":"With the availability and rapid development of GPS-enabled mobile devices and the positioning technology, the Location-Based Services (LBS), aiming at providing customized services according to users' spatio-temporal location information, become increasingly popular in many domains. Users are more and more concerned about privacy issues such as the disclosure of their location in one hand. In the other hand they take advantage of the conveniences of LBS in different aspects of their daily lives. Many researches have been conducted in the location cloaking of location privacy, however, the long cloaking time and large cloaked spatial area affected the quality of service. To solve this problem, we propose a grid-based location cloaking method based on k-anonymity model, which is expected to produce better quality of service by reducing the cloaking time and cloaked spatial region.","PeriodicalId":337858,"journal":{"name":"GeoPrivacy '14","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116697734","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Quantity based aggregation for cadastral databases 基于数量的地籍数据库聚合
Pub Date : 2014-11-04 DOI: 10.1145/2675682.2676394
Firas Al Khalil, A. Gabillon, P. Capolsini
Quantity Based Aggregation (QBA) is a subject that is closely related to inference in databases. The goal is to enforce k out of N disclosure control. In this paper we work on QBA problems in the context of cadastral databases, and we focus on one particular problem: how to prevent a user from accessing all parcels in a region. This work is a new version of the model presented in [2, 3] where we introduce the concept of "Dominant Zones". This concept increases the availability of the data while preserving their confidentiality. Moreover, we provide a more detailed discussion on security aspects of different choices of the model's parameters.
基于数量的聚合(QBA)是与数据库推理密切相关的一门学科。目标是强制执行k out of N的披露控制。在本文中,我们研究地籍数据库背景下的QBA问题,我们重点关注一个特定的问题:如何防止用户访问一个地区的所有包裹。这项工作是在[2,3]中提出的模型的新版本,在[2,3]中我们引入了“主导区域”的概念。这个概念增加了数据的可用性,同时保持了数据的机密性。此外,我们对模型参数的不同选择的安全性方面进行了更详细的讨论。
{"title":"Quantity based aggregation for cadastral databases","authors":"Firas Al Khalil, A. Gabillon, P. Capolsini","doi":"10.1145/2675682.2676394","DOIUrl":"https://doi.org/10.1145/2675682.2676394","url":null,"abstract":"Quantity Based Aggregation (QBA) is a subject that is closely related to inference in databases. The goal is to enforce k out of N disclosure control. In this paper we work on QBA problems in the context of cadastral databases, and we focus on one particular problem: how to prevent a user from accessing all parcels in a region. This work is a new version of the model presented in [2, 3] where we introduce the concept of \"Dominant Zones\". This concept increases the availability of the data while preserving their confidentiality. Moreover, we provide a more detailed discussion on security aspects of different choices of the model's parameters.","PeriodicalId":337858,"journal":{"name":"GeoPrivacy '14","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114189938","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A civilized cyberspace for geoprivacy 文明的地理隐私网络空间
Pub Date : 2014-11-04 DOI: 10.1145/2675682.2676396
Paul Weiser, S. Scheider
We argue that current technical and legal attempts aimed at protecting Geoprivacy are insufficient. We propose a novel 2-dimensional model of privacy, which we term "civilized cyberspace". On one dimension there are engineering, social and legal tools while on the other there are different kinds of interaction with information. We argue why such a civilized cyberspace protects privacy without sacrificing personal freedom on the one hand and opportunities for businesses on the other. We also discuss its realization and propose a technology stack including a permission service for geoprocessing.
我们认为,目前旨在保护地质隐私的技术和法律尝试是不够的。我们提出了一种新的二维隐私模型,我们称之为“文明网络空间”。在一个维度上有工程、社会和法律工具,而在另一个维度上有不同种类的信息交互。我们争论为什么这样一个文明的网络空间在不牺牲个人自由和商业机会的情况下保护隐私。我们还讨论了它的实现,并提出了一个包含许可服务的地理处理技术栈。
{"title":"A civilized cyberspace for geoprivacy","authors":"Paul Weiser, S. Scheider","doi":"10.1145/2675682.2676396","DOIUrl":"https://doi.org/10.1145/2675682.2676396","url":null,"abstract":"We argue that current technical and legal attempts aimed at protecting Geoprivacy are insufficient. We propose a novel 2-dimensional model of privacy, which we term \"civilized cyberspace\". On one dimension there are engineering, social and legal tools while on the other there are different kinds of interaction with information. We argue why such a civilized cyberspace protects privacy without sacrificing personal freedom on the one hand and opportunities for businesses on the other. We also discuss its realization and propose a technology stack including a permission service for geoprocessing.","PeriodicalId":337858,"journal":{"name":"GeoPrivacy '14","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117255084","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
SUDO: a secure database outsourcing solution for location-based systems SUDO:用于基于位置的系统的安全数据库外包解决方案
Pub Date : 2014-11-04 DOI: 10.1145/2675682.2676397
Ling-Jyh Chen, Chen-Ruei Hong, D. Deng, Hu-Cheng Lee, Hsin-Hung Hsieh
Location-based systems (LBS) represent an emerging genre of applications that exploit positioning technologies and facilitate a wide range of location-based services. Unlike conventional information systems, LBS data management is challenging because LBS data is high dimensional and spatio-temporal in nature, and information leakage may result in location related privacy crises. The issue has become even more complicated, as database outsourcing has become inevitable in view of the emerging popularity of LBS deployment. In this paper, we tackle the research challenge and propose a SecUre Database Outsourcing system, called SUDO. By combining the techniques of Hilbert space-filling curves, different invertible encryption algorithms, and genuine mixed data, we show that SUDO is capable of preserving location privacy for LBS against different attacks. Moreover, the proposed solution is simple, effective, and scalable; and it shows promise in supporting LBS data management with outsourced databases.
基于位置的系统(LBS)代表了一种新兴的应用类型,它利用定位技术并促进了广泛的基于位置的服务。与传统的信息系统不同,LBS数据具有高维性和时空性,信息泄露可能导致与位置相关的隐私危机,因此LBS数据管理具有挑战性。鉴于LBS部署的日益普及,数据库外包已成为不可避免的,因此这个问题变得更加复杂。在本文中,我们解决了研究的挑战,并提出了一个安全的数据库外包系统,称为SUDO。通过结合Hilbert空间填充曲线技术、不同的可逆加密算法和真实的混合数据,我们证明了SUDO能够保护LBS的位置隐私免受不同的攻击。此外,所提出的解决方案简单、有效、可扩展;它还显示了通过外包数据库支持LBS数据管理的前景。
{"title":"SUDO: a secure database outsourcing solution for location-based systems","authors":"Ling-Jyh Chen, Chen-Ruei Hong, D. Deng, Hu-Cheng Lee, Hsin-Hung Hsieh","doi":"10.1145/2675682.2676397","DOIUrl":"https://doi.org/10.1145/2675682.2676397","url":null,"abstract":"Location-based systems (LBS) represent an emerging genre of applications that exploit positioning technologies and facilitate a wide range of location-based services. Unlike conventional information systems, LBS data management is challenging because LBS data is high dimensional and spatio-temporal in nature, and information leakage may result in location related privacy crises. The issue has become even more complicated, as database outsourcing has become inevitable in view of the emerging popularity of LBS deployment. In this paper, we tackle the research challenge and propose a SecUre Database Outsourcing system, called SUDO. By combining the techniques of Hilbert space-filling curves, different invertible encryption algorithms, and genuine mixed data, we show that SUDO is capable of preserving location privacy for LBS against different attacks. Moreover, the proposed solution is simple, effective, and scalable; and it shows promise in supporting LBS data management with outsourced databases.","PeriodicalId":337858,"journal":{"name":"GeoPrivacy '14","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125851636","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Protecting patient geo-privacy via a triangular displacement geo-masking method 通过三角位移地理掩蔽法保护患者地理隐私
Pub Date : 2014-11-04 DOI: 10.1145/2675682.2676399
Abdullah Murad, Brian N. Hilton, T. Horan, John Tangenberg
Protecting patient geo-privacy while allowing for valid geographic analyses of the data is a major challenge [1]. As a consequence, a variety of methods have been introduced to mask patients' locational information, also called geo-masking methods [2]. This study assessed the five main geo-masking methods as cited by [3] in terms of re-identification risk and performance. These five methods are Random Direction and Fixed Radius, Random Perturbation within a Circle, Gaussian Displacement, Donut Masking, and Bimodal Gaussian Displacement. Based on the assessment, the study highlighted two major gaps in the design of these geo-masking methods. First, all five geo-masking methods used only population density in calculating the displacement distances between the original locations of points and their new locations. However, other criteria that might be as important as population density were not considered in designing these five methods. These include data sensitivity, research types, quasi-indicator availability, previously generated maps availability, end-users' types, and the possibility of temporal synergy of data. Second, the Donut Masking and the Bimodal Gaussian Displacement methods were found to be superior in terms of minimizing re-identifying risks, but they were also found to be consuming much more processing power compared to the other three geo-masking methods. To address these gaps, this study proposed a new geo-masking method, called the "Triangular Displacement". The primary design, development, and evaluation of the Triangular Displacement method were based on the Design Science Research (DSR) Process Model [4], also known as DSRM. The expected next step is to implement the resultant geo-masking method as a tool to help healthcare data guardians de-identify large sets of PHR automatically. A pilot study with a large Southern Californian healthcare provider has been outlined to examine the efficacy of the developed solution.
在允许对数据进行有效地理分析的同时保护患者地理隐私是一项重大挑战[1]。因此,人们引入了各种方法来掩盖患者的位置信息,也称为地理掩蔽方法[2]。本研究从重新识别风险和性能方面评估了[3]引用的五种主要地理掩蔽方法。这五种方法分别是随机方向和固定半径、圆内随机摄动、高斯位移、甜甜圈掩蔽和双峰高斯位移。基于评估,该研究突出了这些地理掩蔽方法设计中的两个主要缺陷。首先,所有五种地理掩蔽方法在计算点的原始位置和它们的新位置之间的位移距离时只使用人口密度。然而,在设计这五种方法时,没有考虑到可能与人口密度同样重要的其他标准。这些因素包括数据敏感性、研究类型、准指标可用性、以前生成的地图可用性、最终用户类型以及数据时间协同的可能性。其次,甜甜圈掩蔽和双峰高斯位移方法被发现在最小化重新识别风险方面更优越,但与其他三种地理掩蔽方法相比,它们也被发现消耗更多的处理能力。为了解决这些差距,本研究提出了一种新的地理掩蔽方法,称为“三角位移”。三角位移法的初步设计、开发和评估基于设计科学研究(DSR)过程模型[4],也称为DSRM。预期的下一步是将生成的地理屏蔽方法作为一种工具来实现,以帮助医疗保健数据监护人自动去除大量PHR的标识。已经概述了与南加州一家大型医疗保健提供商合作进行的一项试点研究,以检查开发的解决方案的功效。
{"title":"Protecting patient geo-privacy via a triangular displacement geo-masking method","authors":"Abdullah Murad, Brian N. Hilton, T. Horan, John Tangenberg","doi":"10.1145/2675682.2676399","DOIUrl":"https://doi.org/10.1145/2675682.2676399","url":null,"abstract":"Protecting patient geo-privacy while allowing for valid geographic analyses of the data is a major challenge [1]. As a consequence, a variety of methods have been introduced to mask patients' locational information, also called geo-masking methods [2]. This study assessed the five main geo-masking methods as cited by [3] in terms of re-identification risk and performance. These five methods are Random Direction and Fixed Radius, Random Perturbation within a Circle, Gaussian Displacement, Donut Masking, and Bimodal Gaussian Displacement. Based on the assessment, the study highlighted two major gaps in the design of these geo-masking methods. First, all five geo-masking methods used only population density in calculating the displacement distances between the original locations of points and their new locations. However, other criteria that might be as important as population density were not considered in designing these five methods. These include data sensitivity, research types, quasi-indicator availability, previously generated maps availability, end-users' types, and the possibility of temporal synergy of data. Second, the Donut Masking and the Bimodal Gaussian Displacement methods were found to be superior in terms of minimizing re-identifying risks, but they were also found to be consuming much more processing power compared to the other three geo-masking methods. To address these gaps, this study proposed a new geo-masking method, called the \"Triangular Displacement\". The primary design, development, and evaluation of the Triangular Displacement method were based on the Design Science Research (DSR) Process Model [4], also known as DSRM. The expected next step is to implement the resultant geo-masking method as a tool to help healthcare data guardians de-identify large sets of PHR automatically. A pilot study with a large Southern Californian healthcare provider has been outlined to examine the efficacy of the developed solution.","PeriodicalId":337858,"journal":{"name":"GeoPrivacy '14","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114653240","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Venue attacks in location-based social networks 基于位置的社交网络中的地点攻击
Pub Date : 2014-11-04 DOI: 10.1145/2675682.2676395
Lei Jin, Hassan Takabi
Location-Based Social Networks (LBSNs), such as Foursquare, Yelp and Facebook Place, have attracted many people, including business owners who use LBSNs to promote their businesses. A physical location is called a venue or a place of interest in an LBSN. Associated with each venue are several attributes, such as its latitude and longitude values, and the discounts/coupons users can use. LBSN users usually tend to trust venues, which is becoming a key focus of various attacks [7, 10]. By manipulating attributes related to venues, however, an attacker can deceive users, compromise their privacy and destroy the reputation of the venues in an LBSN. In this paper, we call the attacks targeting venues as venue attacks. We first investigate and characterize such attacks in Foursquare, Yelp and Facebook Place. We then study what makes such attacks successful and discuss potential defense approaches against these attacks. To the best of our knowledge, we are the first to characterize various venue attacks in LBSNs.
基于位置的社交网络(LBSNs),如Foursquare、Yelp和Facebook Place,吸引了很多人,包括使用LBSNs来推广业务的企业主。物理位置在LBSN中称为场地或兴趣地点。与每个地点相关联的是几个属性,例如其纬度和经度值,以及用户可以使用的折扣/优惠券。LBSN用户通常倾向于信任场所,这正成为各种攻击的重点[7,10]。然而,通过操纵与场所相关的属性,攻击者可以欺骗用户,损害他们的隐私并破坏LBSN中场所的声誉。本文将针对场所的攻击称为场所攻击。我们首先在Foursquare、Yelp和Facebook Place调查并描述了此类攻击。然后,我们研究是什么使此类攻击成功,并讨论针对这些攻击的潜在防御方法。据我们所知,我们是第一个描述lbsn中各种场所攻击的人。
{"title":"Venue attacks in location-based social networks","authors":"Lei Jin, Hassan Takabi","doi":"10.1145/2675682.2676395","DOIUrl":"https://doi.org/10.1145/2675682.2676395","url":null,"abstract":"Location-Based Social Networks (LBSNs), such as Foursquare, Yelp and Facebook Place, have attracted many people, including business owners who use LBSNs to promote their businesses. A physical location is called a venue or a place of interest in an LBSN. Associated with each venue are several attributes, such as its latitude and longitude values, and the discounts/coupons users can use. LBSN users usually tend to trust venues, which is becoming a key focus of various attacks [7, 10]. By manipulating attributes related to venues, however, an attacker can deceive users, compromise their privacy and destroy the reputation of the venues in an LBSN. In this paper, we call the attacks targeting venues as venue attacks. We first investigate and characterize such attacks in Foursquare, Yelp and Facebook Place. We then study what makes such attacks successful and discuss potential defense approaches against these attacks. To the best of our knowledge, we are the first to characterize various venue attacks in LBSNs.","PeriodicalId":337858,"journal":{"name":"GeoPrivacy '14","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128297812","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
GeoPrivacy '14
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1