首页 > 最新文献

International Journal of Internet Technology and Secured Transactions最新文献

英文 中文
A secured transaction based on blockchain architecture in mobile banking platform 基于区块链架构的移动银行平台安全交易
Q3 Computer Science Pub Date : 2021-01-01 DOI: 10.1504/ijitst.2021.10039177
S. Folorunso, Chinmay Chakraborty, J. B. Awotunde
{"title":"A secured transaction based on blockchain architecture in mobile banking platform","authors":"S. Folorunso, Chinmay Chakraborty, J. B. Awotunde","doi":"10.1504/ijitst.2021.10039177","DOIUrl":"https://doi.org/10.1504/ijitst.2021.10039177","url":null,"abstract":"","PeriodicalId":38357,"journal":{"name":"International Journal of Internet Technology and Secured Transactions","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67218334","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Security threats and countermeasures on the internet of things 物联网的安全威胁与对策
Q3 Computer Science Pub Date : 2021-01-01 DOI: 10.1504/ijitst.2021.10039864
Eugene Rhee
{"title":"Security threats and countermeasures on the internet of things","authors":"Eugene Rhee","doi":"10.1504/ijitst.2021.10039864","DOIUrl":"https://doi.org/10.1504/ijitst.2021.10039864","url":null,"abstract":"","PeriodicalId":38357,"journal":{"name":"International Journal of Internet Technology and Secured Transactions","volume":"25 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67218387","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Providing a model based on Poisson distribution for malware propagation assessment in peer-to-peer networks 提出了一种基于泊松分布的点对点网络恶意软件传播评估模型
Q3 Computer Science Pub Date : 2021-01-01 DOI: 10.1504/ijitst.2021.10040082
M. Mollamotalebi, S. Haghi
{"title":"Providing a model based on Poisson distribution for malware propagation assessment in peer-to-peer networks","authors":"M. Mollamotalebi, S. Haghi","doi":"10.1504/ijitst.2021.10040082","DOIUrl":"https://doi.org/10.1504/ijitst.2021.10040082","url":null,"abstract":"","PeriodicalId":38357,"journal":{"name":"International Journal of Internet Technology and Secured Transactions","volume":"50 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67218446","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Obsolete Ransomware: A Comprehensive Study of the Continued Threat to Users 过时的勒索软件:对用户持续威胁的综合研究
Q3 Computer Science Pub Date : 2020-12-31 DOI: 10.20533/JITST.2046.3723.2020.0082
Arsh Arora, Ragib Hasan, Gary Warner
{"title":"Obsolete Ransomware: A Comprehensive Study of the Continued Threat to Users","authors":"Arsh Arora, Ragib Hasan, Gary Warner","doi":"10.20533/JITST.2046.3723.2020.0082","DOIUrl":"https://doi.org/10.20533/JITST.2046.3723.2020.0082","url":null,"abstract":"","PeriodicalId":38357,"journal":{"name":"International Journal of Internet Technology and Secured Transactions","volume":"58 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72610059","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Recovering Private User Storages in Online Social Networks 恢复在线社交网络中的私有用户存储
Q3 Computer Science Pub Date : 2020-12-31 DOI: 10.20533/JITST.2046.3723.2020.0083
Fabian Schillinger, C. Schindelhauer
Private user storages are used in Online Social Networks (OSN) to securely save private settings and keys on a server. This allows users to access these settings and keys from all their devices. Therefore, private user storages can synchronize these devices. When end-to-end encryption is applied in an OSN to ensure the privacy of users and the communication private user storages can be used to safely store all private and symmetric keys. A user can retrieve the encrypted storage from the server and decrypt it with its password. However, when the password is lost access to the private user storage is lost as well, as the symmetric key cannot be retrieved from the server in contrast to the recovery functions of some OSNs, where a new password can be created. We present a scheme that splits private user storages into different parts and applies two different secret sharing schemes to be able to recover the keys with the help of the other participants of the OSN. The scheme is more robust to missing shares than other secret sharing schemes. Therefore, even when a large fraction of the distributed shares are not accessible because shareholders are inactive or malicious high rates of successful reconstructions can be achieved. Keyword send-to-end encryption, online chat; online social networ, applied secret sharing, private storage, instant messaging service
私有用户存储用于OSN (Online Social Networks)中,用于在服务器上安全地保存私有设置和密钥。这允许用户从他们所有的设备访问这些设置和密钥。因此,私有用户存储可以同步这些设备。当OSN采用端到端加密方式保证用户的隐私时,可以使用通信私钥存储安全地存储所有的私钥和对称密钥。用户可以从服务器检索加密存储并使用其密码对其进行解密。但是,当密码丢失时,由于无法从服务器检索对称密钥,因此也会丢失对私有用户存储的访问权限,而某些osn的恢复功能可以创建新密码。我们提出了一种将私有用户存储分割成不同的部分,并应用两种不同的秘密共享方案,在OSN的其他参与者的帮助下能够恢复密钥的方案。该方案对缺失股份的鲁棒性优于其他秘密共享方案。因此,即使由于股东不活跃或恶意而无法访问大部分已分配股份,也可以实现高成功重建率。关键词发送到端加密,在线聊天;在线社交网络,应用秘密共享,私人存储,即时通讯服务
{"title":"Recovering Private User Storages in Online Social Networks","authors":"Fabian Schillinger, C. Schindelhauer","doi":"10.20533/JITST.2046.3723.2020.0083","DOIUrl":"https://doi.org/10.20533/JITST.2046.3723.2020.0083","url":null,"abstract":"Private user storages are used in Online Social Networks (OSN) to securely save private settings and keys on a server. This allows users to access these settings and keys from all their devices. Therefore, private user storages can synchronize these devices. When end-to-end encryption is applied in an OSN to ensure the privacy of users and the communication private user storages can be used to safely store all private and symmetric keys. A user can retrieve the encrypted storage from the server and decrypt it with its password. However, when the password is lost access to the private user storage is lost as well, as the symmetric key cannot be retrieved from the server in contrast to the recovery functions of some OSNs, where a new password can be created. We present a scheme that splits private user storages into different parts and applies two different secret sharing schemes to be able to recover the keys with the help of the other participants of the OSN. The scheme is more robust to missing shares than other secret sharing schemes. Therefore, even when a large fraction of the distributed shares are not accessible because shareholders are inactive or malicious high rates of successful reconstructions can be achieved. Keyword send-to-end encryption, online chat; online social networ, applied secret sharing, private storage, instant messaging service","PeriodicalId":38357,"journal":{"name":"International Journal of Internet Technology and Secured Transactions","volume":"80 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72850569","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Comparative Study of Traffic Generators: Applicability for Malware Detection Testbeds 流量发生器的比较研究:对恶意软件检测试验台的适用性
Q3 Computer Science Pub Date : 2020-12-31 DOI: 10.20533/JITST.2046.3723.2020.0085
Matt Swann, Joseph R. Rose, G. Bendiab, S. Shiaeles, N. Savage
Network traffic generators are invaluable tools that allow for applied experimentation to evaluate the performance of networks, infrastructure, and security controls, by modelling and simulating the communication packets and payloads that would be produced by machines and devices on the network. Specifically for security applications, these tools can be used to consistently simulate malicious activity on the network and test the components designed to detect and mitigate malicious activities, in a highly reliable and customisable way. However, despite the promising features, most of these tools have some problems that can undermine the correctness of experiments. The accuracy of the simulation results depends strongly on the performance and reliability of the used generator. Thus, in this paper, we investigate the performance and accuracy of three of the most reviewed network traffic generators in literature, namely Cisco TRex, Ostinato and Genesids. Mainly, the comparative experiments examine the strengths and limitations of these tools, for malicious trafficwhich can help the research community to choose the most suitable one to assess the performance of their networks and security controls.
网络流量生成器是非常宝贵的工具,通过建模和模拟网络上的机器和设备产生的通信数据包和有效负载,可以进行应用实验,以评估网络、基础设施和安全控制的性能。特别是对于安全应用程序,这些工具可用于一致地模拟网络上的恶意活动,并以高度可靠和可定制的方式测试用于检测和减轻恶意活动的组件。然而,尽管有很有前途的特性,这些工具中的大多数都有一些问题,可能会破坏实验的正确性。仿真结果的准确性很大程度上取决于所用发电机的性能和可靠性。因此,在本文中,我们研究了文献中评论最多的三种网络流量生成器的性能和准确性,即Cisco TRex, Ostinato和Genesids。主要通过对比实验来检验这些工具的优势和局限性,以帮助研究团体选择最合适的工具来评估他们的网络和安全控制的性能。
{"title":"A Comparative Study of Traffic Generators: Applicability for Malware Detection Testbeds","authors":"Matt Swann, Joseph R. Rose, G. Bendiab, S. Shiaeles, N. Savage","doi":"10.20533/JITST.2046.3723.2020.0085","DOIUrl":"https://doi.org/10.20533/JITST.2046.3723.2020.0085","url":null,"abstract":"Network traffic generators are invaluable tools that allow for applied experimentation to evaluate the performance of networks, infrastructure, and security controls, by modelling and simulating the communication packets and payloads that would be produced by machines and devices on the network. Specifically for security applications, these tools can be used to consistently simulate malicious activity on the network and test the components designed to detect and mitigate malicious activities, in a highly reliable and customisable way. However, despite the promising features, most of these tools have some problems that can undermine the correctness of experiments. The accuracy of the simulation results depends strongly on the performance and reliability of the used generator. Thus, in this paper, we investigate the performance and accuracy of three of the most reviewed network traffic generators in literature, namely Cisco TRex, Ostinato and Genesids. Mainly, the comparative experiments examine the strengths and limitations of these tools, for malicious trafficwhich can help the research community to choose the most suitable one to assess the performance of their networks and security controls.","PeriodicalId":38357,"journal":{"name":"International Journal of Internet Technology and Secured Transactions","volume":"40 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82456797","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Data Controllability for Risk Management in Smart and Intelligent Systems 智能系统风险管理中的数据可控性
Q3 Computer Science Pub Date : 2020-07-13 DOI: 10.20533/JITST.2046.3723.2020.0080
M. Munier, V. Lalanne
Information has become a major asset in companies that have based their business on the production and exploitation of this information, but also in traditional companies that exploit their information with a view to continuously improving their processes. This is the case in collaborative systems where companies are interconnected but also in intelligent systems that have many information exchanges with there environment. It is important that companies keep control of the information they import, process and distribute. In this article, in the context of a risk management approach, we present a new security criterion: controllability.
信息已经成为公司的主要资产,这些公司的业务建立在信息的生产和利用上,而传统公司也在利用信息以不断改进其流程。在公司相互连接的协作系统中,以及在与环境进行许多信息交换的智能系统中,都是如此。公司对其导入、处理和分发的信息保持控制是很重要的。在本文中,在风险管理方法的上下文中,我们提出了一个新的安全标准:可控性。
{"title":"Data Controllability for Risk Management in Smart and Intelligent Systems","authors":"M. Munier, V. Lalanne","doi":"10.20533/JITST.2046.3723.2020.0080","DOIUrl":"https://doi.org/10.20533/JITST.2046.3723.2020.0080","url":null,"abstract":"Information has become a major asset in companies that have based their business on the production and exploitation of this information, but also in traditional companies that exploit their information with a view to continuously improving their processes. This is the case in collaborative systems where companies are interconnected but also in intelligent systems that have many information exchanges with there environment. It is important that companies keep control of the information they import, process and distribute. In this article, in the context of a risk management approach, we present a new security criterion: controllability.","PeriodicalId":38357,"journal":{"name":"International Journal of Internet Technology and Secured Transactions","volume":"69 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89791607","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
ADFT: an adaptive, distributed, fault-tolerant routing algorithm for 3D mesh-based networks-on-chip ADFT:一种自适应、分布式、容错路由算法,适用于基于三维网格的片上网络
Q3 Computer Science Pub Date : 2020-04-27 DOI: 10.1504/IJITST.2020.10022905
Zahra Mogharrabi-Rad, E. Yaghoubi
Nowadays, three-dimensional network-on-chips (3D-NoCs) have been introduced as the most efficient communication architectures. In these architectures, it is likely to encounter some faults. Therefore, an important goal in designing such architectures is to make them more tolerable against faults. In this paper, an adaptive, distributed and fault-tolerant routing algorithm called ADFT is proposed for 3D mesh-based NoC that is able to tolerate permanent faults and does not require any additional circuit for fault-tolerant. In order to evaluate the performance of the ADFT, we compared it with LOFT in terms of latency and throughput. Simulation results show improvement of the proposed method.
目前,三维片上网络(3d - noc)作为最有效的通信架构被引入。在这些架构中,很可能会遇到一些故障。因此,设计这样的体系结构的一个重要目标是使它们对错误更具容忍度。本文提出了一种基于三维网格NoC的自适应、分布式和容错路由算法ADFT,该算法能够容忍永久故障,并且不需要任何额外的容错电路。为了评估ADFT的性能,我们将其与LOFT在延迟和吞吐量方面进行了比较。仿真结果表明了该方法的改进。
{"title":"ADFT: an adaptive, distributed, fault-tolerant routing algorithm for 3D mesh-based networks-on-chip","authors":"Zahra Mogharrabi-Rad, E. Yaghoubi","doi":"10.1504/IJITST.2020.10022905","DOIUrl":"https://doi.org/10.1504/IJITST.2020.10022905","url":null,"abstract":"Nowadays, three-dimensional network-on-chips (3D-NoCs) have been introduced as the most efficient communication architectures. In these architectures, it is likely to encounter some faults. Therefore, an important goal in designing such architectures is to make them more tolerable against faults. In this paper, an adaptive, distributed and fault-tolerant routing algorithm called ADFT is proposed for 3D mesh-based NoC that is able to tolerate permanent faults and does not require any additional circuit for fault-tolerant. In order to evaluate the performance of the ADFT, we compared it with LOFT in terms of latency and throughput. Simulation results show improvement of the proposed method.","PeriodicalId":38357,"journal":{"name":"International Journal of Internet Technology and Secured Transactions","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45998825","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Optimising group key management for frequent-membership-change environment in VANET 优化组密钥管理以应对VANET中频繁的成员变更环境
Q3 Computer Science Pub Date : 2020-04-27 DOI: 10.1504/ijitst.2020.10028984
Baasantsetseg Bold, Young-Hoon Park
In this paper, we propose a tree-based optimal group key management algorithm using a batch rekeying technique, which changes a set of keys at a certain time interval. In batch rekeying, the server collects all the joining and leaving requests during the time interval, and generates rekeying messages. In the proposed algorithm, when a vehicle joins a group, it is located at a certain leaf node of the key-tree according to its leaving time. This reduces the size of the rekeying messages because the vehicles that leave during the same time interval are concentrated on the same parent node. With the proposed scheme, tree-based group key management can be employed to the VANET because it solves the communication overhead problem. Using simulations, we demonstrate that our scheme remarkably reduces the communication cost for updating the group key.
在本文中,我们提出了一种基于树的最优组密钥管理算法,该算法使用批重密钥技术,以一定的时间间隔更改一组密钥。在批量重密钥中,服务器收集该时间间隔内的所有加入和离开请求,并生成重密钥消息。在所提出的算法中,当车辆加入群组时,根据其离开时间将其定位在密钥树的某个叶节点。这减少了重密钥消息的大小,因为在同一时间间隔内离开的车辆集中在同一父节点上。通过该方案,基于树的组密钥管理可以应用于VANET,因为它解决了通信开销问题。通过仿真,我们证明了我们的方案显著降低了更新组密钥的通信成本。
{"title":"Optimising group key management for frequent-membership-change environment in VANET","authors":"Baasantsetseg Bold, Young-Hoon Park","doi":"10.1504/ijitst.2020.10028984","DOIUrl":"https://doi.org/10.1504/ijitst.2020.10028984","url":null,"abstract":"In this paper, we propose a tree-based optimal group key management algorithm using a batch rekeying technique, which changes a set of keys at a certain time interval. In batch rekeying, the server collects all the joining and leaving requests during the time interval, and generates rekeying messages. In the proposed algorithm, when a vehicle joins a group, it is located at a certain leaf node of the key-tree according to its leaving time. This reduces the size of the rekeying messages because the vehicles that leave during the same time interval are concentrated on the same parent node. With the proposed scheme, tree-based group key management can be employed to the VANET because it solves the communication overhead problem. Using simulations, we demonstrate that our scheme remarkably reduces the communication cost for updating the group key.","PeriodicalId":38357,"journal":{"name":"International Journal of Internet Technology and Secured Transactions","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45561788","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Bitcoin price prediction using ARIMA model 基于ARIMA模型的比特币价格预测
Q3 Computer Science Pub Date : 2020-04-27 DOI: 10.1504/ijitst.2020.10028982
M. Poongodi, V. Vijayakumar, N. Chilamkurti
Bitcoin is a highly volatile cryptocurrency with rising popularity. It is a turning point in the way currency is seen. Now the currency, rather than being physical is becoming more and more digital. Due to high variance of solo mining, the number of users joining top most famous bitcoin mining pools is increasing due to the fact that users together under a bitcoin pool will have a higher chance of generating next block in the bitcoins blockchain by reducing the variance and earning the mining reward. In this research paper we are doing a survey on the technology lying underneath bitcoin's network and the various machine learning predictive algorithms. We collected the dataset on bitcoin blockchain from 28 April 2013 to 31 July 2017 which is publicly available on https://coinmarketcap.com and applied the ARIMA model for price prediction of bitcoin.
比特币是一种高度不稳定的加密货币,越来越受欢迎。这是人们看待货币方式的一个转折点。现在,货币不再是实物,而是越来越数字化。由于单独挖矿的高方差,加入最著名的比特币矿池的用户数量正在增加,因为在一个比特币池下的用户通过减少方差和获得挖矿奖励,将有更高的机会在比特币区块链中生成下一个区块。在这篇研究论文中,我们正在对比特币网络和各种机器学习预测算法背后的技术进行调查。我们收集了2013年4月28日至2017年7月31日在https://coinmarketcap.com上公开的比特币区块链数据集,并应用ARIMA模型进行比特币价格预测。
{"title":"Bitcoin price prediction using ARIMA model","authors":"M. Poongodi, V. Vijayakumar, N. Chilamkurti","doi":"10.1504/ijitst.2020.10028982","DOIUrl":"https://doi.org/10.1504/ijitst.2020.10028982","url":null,"abstract":"Bitcoin is a highly volatile cryptocurrency with rising popularity. It is a turning point in the way currency is seen. Now the currency, rather than being physical is becoming more and more digital. Due to high variance of solo mining, the number of users joining top most famous bitcoin mining pools is increasing due to the fact that users together under a bitcoin pool will have a higher chance of generating next block in the bitcoins blockchain by reducing the variance and earning the mining reward. In this research paper we are doing a survey on the technology lying underneath bitcoin's network and the various machine learning predictive algorithms. We collected the dataset on bitcoin blockchain from 28 April 2013 to 31 July 2017 which is publicly available on https://coinmarketcap.com and applied the ARIMA model for price prediction of bitcoin.","PeriodicalId":38357,"journal":{"name":"International Journal of Internet Technology and Secured Transactions","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42334906","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
International Journal of Internet Technology and Secured Transactions
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1