首页 > 最新文献

Journal of Information Security Research最新文献

英文 中文
Security Management and Prevention on the Campus Network against Hacking 校园网的安全管理与防范
Pub Date : 2019-09-01 DOI: 10.6025/jisr/2019/10/3/87-91
Xue-rui Wang, Yong-qiang He
{"title":"Security Management and Prevention on the Campus Network against Hacking","authors":"Xue-rui Wang, Yong-qiang He","doi":"10.6025/jisr/2019/10/3/87-91","DOIUrl":"https://doi.org/10.6025/jisr/2019/10/3/87-91","url":null,"abstract":"","PeriodicalId":339136,"journal":{"name":"Journal of Information Security Research","volume":"162 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123459745","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on Digital Resources Integration Model in Cloud Computing Environment 云计算环境下数字资源集成模型研究
Pub Date : 2019-09-01 DOI: 10.6025/jisr/2019/10/3/92-96
Yingjun Han
{"title":"Research on Digital Resources Integration Model in Cloud Computing Environment","authors":"Yingjun Han","doi":"10.6025/jisr/2019/10/3/92-96","DOIUrl":"https://doi.org/10.6025/jisr/2019/10/3/92-96","url":null,"abstract":"","PeriodicalId":339136,"journal":{"name":"Journal of Information Security Research","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115939544","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Reduced Feature Representation based Online Signature Authentication 基于简化特征表示的在线签名认证
Pub Date : 2019-06-01 DOI: 10.6025/JISR/2019/10/2/39-47
Y. Elmir, Nasreddine Karour, Souleymane Ouled Jaafri
{"title":"A Reduced Feature Representation based Online Signature Authentication","authors":"Y. Elmir, Nasreddine Karour, Souleymane Ouled Jaafri","doi":"10.6025/JISR/2019/10/2/39-47","DOIUrl":"https://doi.org/10.6025/JISR/2019/10/2/39-47","url":null,"abstract":"","PeriodicalId":339136,"journal":{"name":"Journal of Information Security Research","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121841107","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Data and Programming Security Issues in Fog Computing 雾计算中的数据和编程安全问题
Pub Date : 2019-06-01 DOI: 10.6025/JISR/2019/10/2/67-76
P. Vyas, D. Patel
{"title":"Data and Programming Security Issues in Fog Computing","authors":"P. Vyas, D. Patel","doi":"10.6025/JISR/2019/10/2/67-76","DOIUrl":"https://doi.org/10.6025/JISR/2019/10/2/67-76","url":null,"abstract":"","PeriodicalId":339136,"journal":{"name":"Journal of Information Security Research","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116995401","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Keystroke Latency Time Discrete Representation for Password Hardening 密码加固的击键延迟时间离散表示
Pub Date : 2019-06-01 DOI: 10.6025/JISR/2019/10/2/48-66
Khalid Mansour, Khaled W. Mahmoud
{"title":"Keystroke Latency Time Discrete Representation for Password Hardening","authors":"Khalid Mansour, Khaled W. Mahmoud","doi":"10.6025/JISR/2019/10/2/48-66","DOIUrl":"https://doi.org/10.6025/JISR/2019/10/2/48-66","url":null,"abstract":"","PeriodicalId":339136,"journal":{"name":"Journal of Information Security Research","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128512529","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Novel Chaotic Quantum based Homomorphic CPABE Authentication Protocol against Malicious attack in Wireless Communication Networks 一种新的基于混沌量子的无线通信网络中抗恶意攻击的同态CPABE认证协议
Pub Date : 2019-03-01 DOI: 10.6025/JISR/2019/10/1/1-17
B. Madhuravani, Murthy Dsr
With the exponential growth of network bandwidth and computational resources, data security has become one of the interesting research area in wireless communication networks. Authentication is considered as a prime concern in the field of energy-constrained wireless sensor networks due to its wide domain applications. Extensive amount of research works have been carried out to develop more secure authentication system in order to achieve confidentiality and authenticity constraints. Many authentication protocols are mainly depend upon security, scalability, communication constraints and computation overhead. Also, most of the traditional authentication models are failed to authenticate node behavior using integrity, secured key distribution and encryption models. Therefore, there is requirement of very strong authentication protocols in order to provide extended security to the WSN systems. To overcome these issues, a novel quantum chaotic key distribution (QKD) based homomorphic CPABE model was implemented in wireless communication networks. Quantum key Distribution (QKD) is required to improve the security of communication systems. The major objective of quantum key distribution is to generate a key that takes part in encryption. Experimental results proved that the proposed model has high computation speed, storage overhead and secured key distribution compared to traditional wireless authentication models.
随着网络带宽和计算资源的指数级增长,数据安全已成为无线通信网络研究的热点之一。由于其广泛的应用领域,身份验证被认为是能量受限无线传感器网络领域的首要问题。为了实现机密性和真实性的约束,人们进行了大量的研究工作来开发更安全的认证系统。许多身份验证协议主要依赖于安全性、可伸缩性、通信约束和计算开销。此外,大多数传统的身份验证模型都无法使用完整性、安全密钥分发和加密模型对节点行为进行身份验证。因此,需要非常强大的身份验证协议来为WSN系统提供扩展的安全性。为了克服这些问题,在无线通信网络中实现了一种新的基于量子混沌密钥分发(QKD)的同态cabe模型。量子密钥分发(QKD)是提高通信系统安全性的必要手段。量子密钥分发的主要目的是生成参与加密的密钥。实验结果表明,与传统的无线认证模型相比,该模型具有较高的计算速度、较高的存储开销和较高的密钥分发安全性。
{"title":"A Novel Chaotic Quantum based Homomorphic CPABE Authentication Protocol against Malicious attack in Wireless Communication Networks","authors":"B. Madhuravani, Murthy Dsr","doi":"10.6025/JISR/2019/10/1/1-17","DOIUrl":"https://doi.org/10.6025/JISR/2019/10/1/1-17","url":null,"abstract":"With the exponential growth of network bandwidth and computational resources, data security has become one of the interesting research area in wireless communication networks. Authentication is considered as a prime concern in the field of energy-constrained wireless sensor networks due to its wide domain applications. Extensive amount of research works have been carried out to develop more secure authentication system in order to achieve confidentiality and authenticity constraints. Many authentication protocols are mainly depend upon security, scalability, communication constraints and computation overhead. Also, most of the traditional authentication models are failed to authenticate node behavior using integrity, secured key distribution and encryption models. Therefore, there is requirement of very strong authentication protocols in order to provide extended security to the WSN systems. To overcome these issues, a novel quantum chaotic key distribution (QKD) based homomorphic CPABE model was implemented in wireless communication networks. Quantum key Distribution (QKD) is required to improve the security of communication systems. The major objective of quantum key distribution is to generate a key that takes part in encryption. Experimental results proved that the proposed model has high computation speed, storage overhead and secured key distribution compared to traditional wireless authentication models.","PeriodicalId":339136,"journal":{"name":"Journal of Information Security Research","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124535408","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Authentication of Significant security for accessing Password through Network System 通过网络系统访问密码的重要安全认证
Pub Date : 2019-03-01 DOI: 10.6025/jisr/2019/10/1/18-23
Syed Umar
Significant security password to authenticate users on a network system network system for small and large. Text passwords is the standard form of authentication of users on the site for comfort and convenience. In fact, it probably caught on the user's password with various threats and vulnerabilities and threats. ordinary users use text passwords for authentication when they register with the selected account on the site. weak password selected by the user and the application between the sites that a domino effect. Additionally, enter the password of the computer thief a password is not a reliable threat arrival could begin passwords, such as phishing, key loggers and capturing malware attacks steal. OPASS introduce more help with a specific user authentication protocol in this paper. The concept of the universal system and methods of organizations and users to implement password policies. The system is designed for user authentication protocols OTP relating to benefit the users of mobile phones and short message services giant passwords and reuse of passwords to steal a series of attacks. OPass a live phone number of each contribution, this unique recreation and telecom service providers involved have shot three OPASS, users need to log in a password on any computer in the long-term prototype website. After remembering OPASS, we believe OPASS effective and inexpensive compared to a conventional web authentication mechanism.
重要的安全密码对网络系统中的用户进行身份验证,网络系统适用于大小。为了方便和舒适,文本密码是网站用户认证的标准形式。事实上,它可能会捕捉到用户密码中的各种威胁、漏洞和威胁。普通用户在网站上注册选定的帐户时使用文本密码进行身份验证。由用户选择的弱密码与应用程序之间的站点即多米诺骨牌效应。此外,输入密码的电脑窃贼的密码是不可靠的威胁,可以开始密码的到来,如网络钓鱼,键盘记录器和捕获恶意软件的攻击窃取。本文介绍了OPASS对特定用户认证协议的更多帮助。通用系统的概念以及组织和用户实施密码策略的方法。该系统是针对用户认证协议OTP相关而设计的,有利于用户对手机和短信服务的巨型密码和重复使用密码进行窃取等一系列攻击。OPass每个贡献一个现场电话号码,这种独特的娱乐和电信服务提供商都参与拍摄了三个OPass,用户需要在任何一台电脑上登录一个密码,就可以长期原型网站。在记住了OPASS之后,我们相信与传统的web身份验证机制相比,OPASS是有效且便宜的。
{"title":"An Authentication of Significant security for accessing Password through Network System","authors":"Syed Umar","doi":"10.6025/jisr/2019/10/1/18-23","DOIUrl":"https://doi.org/10.6025/jisr/2019/10/1/18-23","url":null,"abstract":"Significant security password to authenticate users on a network system network system for small and large. Text passwords is the standard form of authentication of users on the site for comfort and convenience. In fact, it probably caught on the user's password with various threats and vulnerabilities and threats. ordinary users use text passwords for authentication when they register with the selected account on the site. weak password selected by the user and the application between the sites that a domino effect. Additionally, enter the password of the computer thief a password is not a reliable threat arrival could begin passwords, such as phishing, key loggers and capturing malware attacks steal. OPASS introduce more help with a specific user authentication protocol in this paper. The concept of the universal system and methods of organizations and users to implement password policies. The system is designed for user authentication protocols OTP relating to benefit the users of mobile phones and short message services giant passwords and reuse of passwords to steal a series of attacks. OPass a live phone number of each contribution, this unique recreation and telecom service providers involved have shot three OPASS, users need to log in a password on any computer in the long-term prototype website. After remembering OPASS, we believe OPASS effective and inexpensive compared to a conventional web authentication mechanism.","PeriodicalId":339136,"journal":{"name":"Journal of Information Security Research","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126421118","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Malware Detection using Sub-Signatures and Machine Learning Technique 基于子签名和机器学习技术的恶意软件检测
Pub Date : 2018-09-01 DOI: 10.6025/JISR/2018/9/3/96-106
B. Khammas
{"title":"Malware Detection using Sub-Signatures and Machine Learning Technique","authors":"B. Khammas","doi":"10.6025/JISR/2018/9/3/96-106","DOIUrl":"https://doi.org/10.6025/JISR/2018/9/3/96-106","url":null,"abstract":"","PeriodicalId":339136,"journal":{"name":"Journal of Information Security Research","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128937450","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Fully Homomorphic Encryption based on Euler’s Theorem 基于欧拉定理的全同态加密
Pub Date : 2018-09-01 DOI: 10.6025/jisr/2018/9/3/83-95
Sarah Shihab Hamad, A. Sagheer
Cloud computing enables sharing of resources and services. In the cloud computing the client (user) puts his data in the cloud, and any computations on his stored data will be implemented in the cloud. To produce the effective services, some of the cloud service providers share the information with third parties. The third party can reach to the client private data and modifies the information to make it beneficial to him. Therefore, the security becomes the main thing in cloud computing. The scheme that allows to executing several computations on the encrypted message without decrypting the message is called homomorphic encryption. This paper provides a Fully Homomorphic Encryption Scheme SA that we can apply it for security of a cloud computing. The proposed scheme is based on Euler’s theorem, which proved both addition and multiplication operations at the same time on ciphertext without decryption. We compute the time complexity of the encryption and decryption function for the Elgamal and RSA cryptosystems compared to the proposed SA scheme and also compared the execution time among the three schemes with varies sizes of messages and varies lengths of secret key, and finally the security of the three schemes is analyzed. As a result, in calculations of the execution time of ElGamal and RSA cryptosystems compared to the proposed SA scheme, it was observed that the length of the secret key effect on the execution time, in which the execution time increased when the length of the private key was increased. The proposed scheme showed a good security for the stored data on the cloud.
云计算实现了资源和服务的共享。在云计算中,客户端(用户)将其数据放在云中,对其存储数据的任何计算都将在云中实现。为了提供有效的服务,一些云服务提供商与第三方共享信息。第三方可以接触到客户的私人数据,并对其进行修改,使其对客户有利。因此,安全成为云计算的重中之重。允许在不解密消息的情况下对加密消息执行多个计算的方案称为同态加密。本文提出了一种完全同态加密方案SA,可以应用于云计算的安全。该方案基于欧拉定理,在不解密的密文上同时证明了加法和乘法运算。我们计算了Elgamal和RSA密码系统加解密函数与SA方案的时间复杂度,并比较了不同消息大小和不同密钥长度的三种方案的执行时间,最后分析了三种方案的安全性。因此,在将ElGamal和RSA密码系统的执行时间与所提出的SA方案进行比较的计算中,可以观察到私钥的长度对执行时间的影响,其中私钥的长度越大,执行时间越长。该方案对存储在云上的数据具有良好的安全性。
{"title":"Fully Homomorphic Encryption based on Euler’s Theorem","authors":"Sarah Shihab Hamad, A. Sagheer","doi":"10.6025/jisr/2018/9/3/83-95","DOIUrl":"https://doi.org/10.6025/jisr/2018/9/3/83-95","url":null,"abstract":"Cloud computing enables sharing of resources and services. In the cloud computing the client (user) puts his data in the cloud, and any computations on his stored data will be implemented in the cloud. To produce the effective services, some of the cloud service providers share the information with third parties. The third party can reach to the client private data and modifies the information to make it beneficial to him. Therefore, the security becomes the main thing in cloud computing. The scheme that allows to executing several computations on the encrypted message without decrypting the message is called homomorphic encryption. This paper provides a Fully Homomorphic Encryption Scheme SA that we can apply it for security of a cloud computing. The proposed scheme is based on Euler’s theorem, which proved both addition and multiplication operations at the same time on ciphertext without decryption. We compute the time complexity of the encryption and decryption function for the Elgamal and RSA cryptosystems compared to the proposed SA scheme and also compared the execution time among the three schemes with varies sizes of messages and varies lengths of secret key, and finally the security of the three schemes is analyzed. As a result, in calculations of the execution time of ElGamal and RSA cryptosystems compared to the proposed SA scheme, it was observed that the length of the secret key effect on the execution time, in which the execution time increased when the length of the private key was increased. The proposed scheme showed a good security for the stored data on the cloud.","PeriodicalId":339136,"journal":{"name":"Journal of Information Security Research","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123468511","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
An Approach to Discover the Sinkhole and Selective Forwarding Attack in IoT 物联网中天坑和选择性转发攻击的发现方法
Pub Date : 2018-09-01 DOI: 10.6025/jisr/2018/9/3/107-118
Atena Shiranzaei, R. Khan
{"title":"An Approach to Discover the Sinkhole and Selective Forwarding Attack in IoT","authors":"Atena Shiranzaei, R. Khan","doi":"10.6025/jisr/2018/9/3/107-118","DOIUrl":"https://doi.org/10.6025/jisr/2018/9/3/107-118","url":null,"abstract":"","PeriodicalId":339136,"journal":{"name":"Journal of Information Security Research","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134292250","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
Journal of Information Security Research
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1