首页 > 最新文献

2012 XIII International Symposium on Problems of Redundancy in Information and Control Systems最新文献

英文 中文
RFID advanced ultra lightweight authentication protocol RFID先进的超轻量级认证协议
S. Bezzateev, D. Kovalev
The advanced protocol of mutual authentication for ultra-lightweight RFID tags is considered. The changing of the standard operation of addition modulo 2m by the operation of addition modulo 2m - 1 allows to avoid well-known authentication protocols desynchronization, anonymity and disclosure of the secret vulnerabilities.
研究了超轻量RFID标签相互认证的先进协议。通过加法模2m - 1的操作改变加法模2m的标准操作,可以避免知名认证协议的不同步、匿名和秘密漏洞的泄露。
{"title":"RFID advanced ultra lightweight authentication protocol","authors":"S. Bezzateev, D. Kovalev","doi":"10.1109/RED.2012.6338395","DOIUrl":"https://doi.org/10.1109/RED.2012.6338395","url":null,"abstract":"The advanced protocol of mutual authentication for ultra-lightweight RFID tags is considered. The changing of the standard operation of addition modulo 2m by the operation of addition modulo 2m - 1 allows to avoid well-known authentication protocols desynchronization, anonymity and disclosure of the secret vulnerabilities.","PeriodicalId":403644,"journal":{"name":"2012 XIII International Symposium on Problems of Redundancy in Information and Control Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117202549","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Analysis of gradient statistical attack at block ciphers RC6, MARS, CAST-128 分组密码RC6, MARS, CAST-128的梯度统计攻击分析
Alexander Lysyak
This work covers an experimental research of statistical methods in cryptoanalysis on the example of the block ciphers RC6, MARS and CAST-128. The offered gradient attack is based on the statistical test named “bookstack”. The described schemes and modifications of the attack allow to reduce complexity of finding a secret key in compare to earlier known types of attacks. Researches of efficiency of gradient statistical attack are conducted in this work, limits of its practical and theoretical applicability are shown (9 rounds of cipher RC6, 21 round of MARS and 4 rounds of CAST-128). Also in the work deduced analytical dependences between effectively attacked rounds and temporal and hardware complexity of attack. Besides, for ciphers RC6 and MARS it was developed the modifications of gradient attack, which considerably reduce time and operational complexity have been developed. Also in this work the method of definition optimal parameters of attack is shown; time complexity and its dependence on test and size parameters of a ciphertext are researched; theoretical requirements for the computing resources for realization of attack are shown.
本文以分组密码RC6、MARS和CAST-128为例,对统计方法在密码分析中的应用进行了实验研究。所提供的梯度攻击基于名为“bookstack”的统计测试。与早期已知的攻击类型相比,所描述的攻击方案和修改允许降低查找密钥的复杂性。本文对梯度统计攻击的效率进行了研究,指出了梯度统计攻击的实际和理论适用性的局限性(9轮密码RC6、21轮密码MARS和4轮密码CAST-128)。同时推导了有效攻击回合与攻击时间和硬件复杂度之间的解析依赖关系。此外,针对密码RC6和MARS进行了梯度攻击的改进,大大减少了时间和操作复杂度。并给出了确定攻击最优参数的方法;研究了密文的时间复杂度及其与测试参数和大小参数的关系;给出了实现攻击对计算资源的理论要求。
{"title":"Analysis of gradient statistical attack at block ciphers RC6, MARS, CAST-128","authors":"Alexander Lysyak","doi":"10.1109/RED.2012.6338405","DOIUrl":"https://doi.org/10.1109/RED.2012.6338405","url":null,"abstract":"This work covers an experimental research of statistical methods in cryptoanalysis on the example of the block ciphers RC6, MARS and CAST-128. The offered gradient attack is based on the statistical test named “bookstack”. The described schemes and modifications of the attack allow to reduce complexity of finding a secret key in compare to earlier known types of attacks. Researches of efficiency of gradient statistical attack are conducted in this work, limits of its practical and theoretical applicability are shown (9 rounds of cipher RC6, 21 round of MARS and 4 rounds of CAST-128). Also in the work deduced analytical dependences between effectively attacked rounds and temporal and hardware complexity of attack. Besides, for ciphers RC6 and MARS it was developed the modifications of gradient attack, which considerably reduce time and operational complexity have been developed. Also in this work the method of definition optimal parameters of attack is shown; time complexity and its dependence on test and size parameters of a ciphertext are researched; theoretical requirements for the computing resources for realization of attack are shown.","PeriodicalId":403644,"journal":{"name":"2012 XIII International Symposium on Problems of Redundancy in Information and Control Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127579931","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Performance analysis of underwater acoustic random access networks 水声随机接入网络性能分析
Andrej Stefanov, M. Stojanovic
We analyze the performance of underwater acoustic random access networks. The assumption is that the nodes are distributed in the plane according to a two dimensional Poisson point process. This is a suitable model for a network of bottom mounted nodes. The node-to-node channel is modeled based on an underwater acoustic propagation path loss and fading. We provide a statistical characterization of the network interference, by taking into account the acoustic propagation characteristics, and investigate their impact on the network throughput. The derived results are valid for various fading models and traffic patterns. Numerical examples are presented that illustrate the network performance.
分析了水声随机接入网络的性能。假设节点按照二维泊松点过程在平面上分布。对于底部安装节点的网络,这是一个合适的模型。基于水声传播路径的损耗和衰落,建立了节点到节点信道模型。通过考虑声传播特性,我们提供了网络干扰的统计特征,并研究了它们对网络吞吐量的影响。所得结果适用于各种衰落模型和交通模式。给出了数值算例来说明该网络的性能。
{"title":"Performance analysis of underwater acoustic random access networks","authors":"Andrej Stefanov, M. Stojanovic","doi":"10.1109/RED.2012.6338414","DOIUrl":"https://doi.org/10.1109/RED.2012.6338414","url":null,"abstract":"We analyze the performance of underwater acoustic random access networks. The assumption is that the nodes are distributed in the plane according to a two dimensional Poisson point process. This is a suitable model for a network of bottom mounted nodes. The node-to-node channel is modeled based on an underwater acoustic propagation path loss and fading. We provide a statistical characterization of the network interference, by taking into account the acoustic propagation characteristics, and investigate their impact on the network throughput. The derived results are valid for various fading models and traffic patterns. Numerical examples are presented that illustrate the network performance.","PeriodicalId":403644,"journal":{"name":"2012 XIII International Symposium on Problems of Redundancy in Information and Control Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125771685","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Fast enumeration for Grassmannian space 格拉斯曼空间的快速枚举
Y. Medvedeva
The Grassmanian Gq(n; k) is the set of all k-dimensional subspaces of vector space Fnq. The coding of elements of Grassmanian was considered in many papers [1]-[7], and has the application in network coding [8]-[19]. The enumerative coding of the elements of Grassmanian Gq(n; k) is association every element of the Grassmanian with its number, i. e. the number from [0;...; |Gq(n; k)| - 1]. The algorithm of enumerative coding of the elements of the Grassmanian, which has complexity O(nk(n - k) log n log log n) is presented in the paper [20]. We present the advanced algorithm of the enumerative coding of the elements of the Grassmanian, which has the complexity that does not exceed O(n2log2nloglog n). The advanced algorithm is based on the method of fast enumeration of combinatorial objects from the paper of B. Ryabko [21].
格拉斯曼语Gq(n;k)是向量空间Fnq的所有k维子空间的集合。许多论文都考虑了格拉斯曼元的编码[1]-[7],并在网络编码[8]-[19]中有应用。格拉斯曼Gq(n)元的枚举编码;k)是将格拉斯曼矩阵中的每个元素与其编号关联起来,即从[0;…;]|《Gq》(n;K)| - 1]。本文提出了复杂度为O(nk(n - k) log n log log n)的格拉斯曼元的枚举编码算法。本文提出了复杂度不超过O(n2log2nloglog n)的格拉斯曼元枚举编码的改进算法,该算法是基于B. Ryabko[21]论文中组合对象的快速枚举方法。
{"title":"Fast enumeration for Grassmannian space","authors":"Y. Medvedeva","doi":"10.1109/RED.2012.6338406","DOIUrl":"https://doi.org/10.1109/RED.2012.6338406","url":null,"abstract":"The Grassmanian Gq(n; k) is the set of all k-dimensional subspaces of vector space Fnq. The coding of elements of Grassmanian was considered in many papers [1]-[7], and has the application in network coding [8]-[19]. The enumerative coding of the elements of Grassmanian Gq(n; k) is association every element of the Grassmanian with its number, i. e. the number from [0;...; |Gq(n; k)| - 1]. The algorithm of enumerative coding of the elements of the Grassmanian, which has complexity O(nk(n - k) log n log log n) is presented in the paper [20]. We present the advanced algorithm of the enumerative coding of the elements of the Grassmanian, which has the complexity that does not exceed O(n2log2nloglog n). The advanced algorithm is based on the method of fast enumeration of combinatorial objects from the paper of B. Ryabko [21].","PeriodicalId":403644,"journal":{"name":"2012 XIII International Symposium on Problems of Redundancy in Information and Control Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131028325","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
On a class of cyclic codes whose minimum distance exceeds the BCH bound 一类最小距离超过BCH界的循环码
V. Lomakov
It is shown that for any prime p and any integer ℓ ≥ 1, there is a cyclic code of length p2(ℓ+1) - 1 and dimension pℓ+1(pℓ+1 - 2) over the finite field GF(p) whose minimum distance ≥ p + 2ℓ is greater than or equal to the BCH bound p + 2.
证明了在有限域GF(p)上,对于任意素数p和任意整数r≥1,存在一个长度为p (r +1) - 1,维数为p (r +1) - 1(p +1 - 2)的循环码,其最小距离≥p + 2 r大于或等于BCH界p + 2。
{"title":"On a class of cyclic codes whose minimum distance exceeds the BCH bound","authors":"V. Lomakov","doi":"10.1109/RED.2012.6338404","DOIUrl":"https://doi.org/10.1109/RED.2012.6338404","url":null,"abstract":"It is shown that for any prime p and any integer ℓ ≥ 1, there is a cyclic code of length p<sup>2(ℓ+1)</sup> - 1 and dimension p<sup>ℓ+1</sup>(p<sup>ℓ+1</sup> - 2) over the finite field GF(p) whose minimum distance ≥ p + 2ℓ is greater than or equal to the BCH bound p + 2.","PeriodicalId":403644,"journal":{"name":"2012 XIII International Symposium on Problems of Redundancy in Information and Control Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133383940","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Redundancy in speech signals and robustness of automatic speech recognition 语音信号的冗余性与语音自动识别的鲁棒性
J. Yousafzai, Z. Cvetković, M. Ager, Peter Sollich
Automatic speech recognition (ASR) systems are yet to achieve the level of robustness inherent to speech recognition by the human auditory system. The primary goal of this paper is to argue that exploiting the redundancy in speech signals could be the key to solving the problem of the lack of robustness. This view is supported by our recent results on phoneme classification and recognition in the presence of noise which are surveyed in this paper.
自动语音识别(ASR)系统尚未达到人类听觉系统语音识别固有的鲁棒性水平。本文的主要目的是论证利用语音信号中的冗余可能是解决鲁棒性不足问题的关键。这一观点得到了我们最近在有噪声情况下音素分类和识别的研究结果的支持。
{"title":"Redundancy in speech signals and robustness of automatic speech recognition","authors":"J. Yousafzai, Z. Cvetković, M. Ager, Peter Sollich","doi":"10.1109/RED.2012.6338416","DOIUrl":"https://doi.org/10.1109/RED.2012.6338416","url":null,"abstract":"Automatic speech recognition (ASR) systems are yet to achieve the level of robustness inherent to speech recognition by the human auditory system. The primary goal of this paper is to argue that exploiting the redundancy in speech signals could be the key to solving the problem of the lack of robustness. This view is supported by our recent results on phoneme classification and recognition in the presence of noise which are surveyed in this paper.","PeriodicalId":403644,"journal":{"name":"2012 XIII International Symposium on Problems of Redundancy in Information and Control Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121107354","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The Goertzel-Blahut algorithm is closely related to the fast fourier transform Goertzel-Blahut算法与快速傅里叶变换密切相关
S. Fedorenko
The Goertzel-Blahut algorithm for the discrete Fourier transform computation presented in the paper belongs to a class of semifast algorithms, but its modification is closely related to the fast Fourier transform algorithms.
本文提出的用于离散傅里叶变换计算的Goertzel-Blahut算法属于一类半快速算法,但它的修正与快速傅里叶变换算法密切相关。
{"title":"The Goertzel-Blahut algorithm is closely related to the fast fourier transform","authors":"S. Fedorenko","doi":"10.1109/RED.2012.6338398","DOIUrl":"https://doi.org/10.1109/RED.2012.6338398","url":null,"abstract":"The Goertzel-Blahut algorithm for the discrete Fourier transform computation presented in the paper belongs to a class of semifast algorithms, but its modification is closely related to the fast Fourier transform algorithms.","PeriodicalId":403644,"journal":{"name":"2012 XIII International Symposium on Problems of Redundancy in Information and Control Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114158946","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
On fast decoding of interleaved Gabidulin codes 交错加比度林码的快速译码
V. Sidorenko, A. Wachter-Zeh, Di Chen
Interleaving or the direct sum of L Gabidulin codes with rank distance d can be applied for random network coding. For the codes over Fqm a fast decoding algorithm is proposed correcting with high probability errors of rank up to L over L+1(d-1). The algorithm is based on fast skew-feedback shift-register synthesis and for fixed L has time complexity O(m3logm) operations in the base field Fq.
随机网络编码可以采用秩距为d的L个Gabidulin码的交错或直接和。对于Fqm上的码,提出了一种快速译码算法,对秩高概率误差进行纠错,纠错概率最高可达L / L+1(d-1)。该算法基于快速斜反馈移位寄存器合成,对于固定L,基域Fq的运算时间复杂度为0 (m3logm)。
{"title":"On fast decoding of interleaved Gabidulin codes","authors":"V. Sidorenko, A. Wachter-Zeh, Di Chen","doi":"10.1109/RED.2012.6338413","DOIUrl":"https://doi.org/10.1109/RED.2012.6338413","url":null,"abstract":"Interleaving or the direct sum of L Gabidulin codes with rank distance d can be applied for random network coding. For the codes over Fqm a fast decoding algorithm is proposed correcting with high probability errors of rank up to L over L+1(d-1). The algorithm is based on fast skew-feedback shift-register synthesis and for fixed L has time complexity O(m3logm) operations in the base field Fq.","PeriodicalId":403644,"journal":{"name":"2012 XIII International Symposium on Problems of Redundancy in Information and Control Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133362709","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Estimating the performance of computer systems through computer capacity 通过计算机容量估计计算机系统的性能
B. Ryabko, A. Fionov
We consider a notion of computer capacity as a novel approach to evaluation of computer performance. Computer capacity is based on the number of different tasks that can be executed in a given time. This characteristic does not depend on any particular task and is determined only by the computer architecture. It can be easily computed at the design stage and used for optimizing architectural decisions.
我们认为计算机容量的概念是一种评估计算机性能的新方法。计算机的容量取决于在给定时间内可以执行的不同任务的数量。这个特性不依赖于任何特定的任务,只由计算机体系结构决定。它可以在设计阶段轻松计算,并用于优化体系结构决策。
{"title":"Estimating the performance of computer systems through computer capacity","authors":"B. Ryabko, A. Fionov","doi":"10.1109/RED.2012.6338412","DOIUrl":"https://doi.org/10.1109/RED.2012.6338412","url":null,"abstract":"We consider a notion of computer capacity as a novel approach to evaluation of computer performance. Computer capacity is based on the number of different tasks that can be executed in a given time. This characteristic does not depend on any particular task and is determined only by the computer architecture. It can be easily computed at the design stage and used for optimizing architectural decisions.","PeriodicalId":403644,"journal":{"name":"2012 XIII International Symposium on Problems of Redundancy in Information and Control Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116515226","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
On subset subcodes of linear codes 线性码的子集子码
A. Urivskiy
We consider a problem of finding codes over alphabets whose size s is not equal to the size of any finite field. We adopted an approach when a linear block code is taken over some finite field GF(q) such that q >; s. Then a subcode is being found such that all the code symbols of all its codewords belong to a subset of GF(q) of size s. Upper and lower bounds on the cardinality of the subset subcode are given. Also coding procedures are considered. Error detection and/or correction procedures are those of the parent code.
我们考虑一个在字母上寻找码的问题,其大小s不等于任何有限域的大小。我们采用了一种方法,当一个线性分组码被置于某个有限域GF(q)上时,使得q >;s.然后找到一个子码,使其所有码字的所有码符都属于大小为s的GF(q)的子集。给出该子码子集的基数的上界和下界。还考虑了编码过程。错误检测和/或纠正程序是父代码的程序。
{"title":"On subset subcodes of linear codes","authors":"A. Urivskiy","doi":"10.1109/RED.2012.6338415","DOIUrl":"https://doi.org/10.1109/RED.2012.6338415","url":null,"abstract":"We consider a problem of finding codes over alphabets whose size s is not equal to the size of any finite field. We adopted an approach when a linear block code is taken over some finite field GF(q) such that q >; s. Then a subcode is being found such that all the code symbols of all its codewords belong to a subset of GF(q) of size s. Upper and lower bounds on the cardinality of the subset subcode are given. Also coding procedures are considered. Error detection and/or correction procedures are those of the parent code.","PeriodicalId":403644,"journal":{"name":"2012 XIII International Symposium on Problems of Redundancy in Information and Control Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134640720","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2012 XIII International Symposium on Problems of Redundancy in Information and Control Systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1