首页 > 最新文献

1993 Proceedings of IEEE International Carnahan Conference on Security Technology最新文献

英文 中文
A heuristic approach to reconstruct crime scene based on mark-theory 基于马克理论的犯罪现场重构启发式方法
Pub Date : 1993-10-13 DOI: 10.1109/CCST.1993.386796
C. Kou, C.-h. Lin, F. Springsteel
The authors consider the use of a CD model to reconstruct a crime scene using the technology of artificial intelligence, with particular reference to gunshot-caused bloodstain evidence. They attempt to incorporate the domain knowledge of mark theory and the experiences of investigators in their expert system, which helps both the investigators and qualifies practitioners to gain enough evidence from the crime scene.<>
作者考虑使用CD模型利用人工智能技术重建犯罪现场,特别是参考枪击造成的血迹证据。他们试图将标记理论的领域知识和调查员的经验结合到他们的专家系统中,这有助于调查员和合格的从业者从犯罪现场获得足够的证据。
{"title":"A heuristic approach to reconstruct crime scene based on mark-theory","authors":"C. Kou, C.-h. Lin, F. Springsteel","doi":"10.1109/CCST.1993.386796","DOIUrl":"https://doi.org/10.1109/CCST.1993.386796","url":null,"abstract":"The authors consider the use of a CD model to reconstruct a crime scene using the technology of artificial intelligence, with particular reference to gunshot-caused bloodstain evidence. They attempt to incorporate the domain knowledge of mark theory and the experiences of investigators in their expert system, which helps both the investigators and qualifies practitioners to gain enough evidence from the crime scene.<<ETX>>","PeriodicalId":404786,"journal":{"name":"1993 Proceedings of IEEE International Carnahan Conference on Security Technology","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123133784","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
New evaluation methods for reducing environment effects in radar detection 降低雷达探测环境影响的新评估方法
Pub Date : 1993-10-13 DOI: 10.1109/CCST.1993.386810
M. Hofmeister
Dornier has developed a radar intrusion detection sensor (RADOBS) which largely eliminates environmental and ambient effects such as rain and electromagnetic interference. RADOBS is a monostatic pulse Doppler miniradar for mobile and stationary use. The system can be installed in two versions: RADOBS-R for omnidirectional detection by means of a ring zone and RADOBS-V with a directed sector zone. The detection zones of both versions can be defined precisely to ensure that no alarm is released outside these defined zones.<>
多尼尔开发了一种雷达入侵检测传感器(RADOBS),它在很大程度上消除了雨水和电磁干扰等环境和环境影响。RADOBS是一种用于移动和固定使用的单稳态脉冲多普勒微型雷达。该系统可安装两种版本:RADOBS-R采用环形区进行全向探测,RADOBS-V采用定向扇形区进行探测。两种版本的检测区域都可以精确定义,以确保在这些定义的区域之外不会释放告警。
{"title":"New evaluation methods for reducing environment effects in radar detection","authors":"M. Hofmeister","doi":"10.1109/CCST.1993.386810","DOIUrl":"https://doi.org/10.1109/CCST.1993.386810","url":null,"abstract":"Dornier has developed a radar intrusion detection sensor (RADOBS) which largely eliminates environmental and ambient effects such as rain and electromagnetic interference. RADOBS is a monostatic pulse Doppler miniradar for mobile and stationary use. The system can be installed in two versions: RADOBS-R for omnidirectional detection by means of a ring zone and RADOBS-V with a directed sector zone. The detection zones of both versions can be defined precisely to ensure that no alarm is released outside these defined zones.<<ETX>>","PeriodicalId":404786,"journal":{"name":"1993 Proceedings of IEEE International Carnahan Conference on Security Technology","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122994235","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A prison guard Duress alarm location system 一种狱警胁迫报警定位系统
Pub Date : 1993-10-13 DOI: 10.1109/CCST.1993.386816
T. Christ, P. Godwin, R. Lavigne
The authors discuss concepts used in developing the CSC (Correctional Services Canada) Duress Alarm Location System (DALS). A block diagram and theory of operation for the system are presented. A sample data and test results for an actual test installation are presented and analyzed. It is concluded that the DALS is able to acknowledge and locate a duress alarm within an indoor environment with useful precision and reliability.<>
作者讨论了在开发CSC(加拿大惩教服务)胁迫报警定位系统(DALS)中使用的概念。给出了系统的框图和工作原理。给出了一个实际试验装置的试验数据和试验结果,并进行了分析。结论是,DALS能够识别和定位室内环境中的胁迫报警,具有有用的精度和可靠性。
{"title":"A prison guard Duress alarm location system","authors":"T. Christ, P. Godwin, R. Lavigne","doi":"10.1109/CCST.1993.386816","DOIUrl":"https://doi.org/10.1109/CCST.1993.386816","url":null,"abstract":"The authors discuss concepts used in developing the CSC (Correctional Services Canada) Duress Alarm Location System (DALS). A block diagram and theory of operation for the system are presented. A sample data and test results for an actual test installation are presented and analyzed. It is concluded that the DALS is able to acknowledge and locate a duress alarm within an indoor environment with useful precision and reliability.<<ETX>>","PeriodicalId":404786,"journal":{"name":"1993 Proceedings of IEEE International Carnahan Conference on Security Technology","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129462944","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 49
A practical design for secure broadcasting using PKD concept 使用PKD概念的安全广播的实用设计
Pub Date : 1993-10-13 DOI: 10.1109/CCST.1993.386832
J. Jan, Y. Y. Chern
Based on the concept of public key distribution (PKD), a new practical design for a secure broadcasting system is proposed. The proposed secure broadcast cryptosystem is based on the Diffie-Hellman public key distribution concept. The communication key is hidden with the RSA scheme. The security of the cryptosystem is therefore the same as that of the RSA scheme. The single key concept is used to reduce the load of additional control messages.<>
基于公钥分发(PKD)的概念,提出了一种新的安全广播系统的实用设计方案。所提出的安全广播密码系统是基于Diffie-Hellman公钥分发的概念。使用RSA方案隐藏通信密钥。因此,该密码系统的安全性与RSA方案相同。单键概念用于减少额外控制消息的负载。
{"title":"A practical design for secure broadcasting using PKD concept","authors":"J. Jan, Y. Y. Chern","doi":"10.1109/CCST.1993.386832","DOIUrl":"https://doi.org/10.1109/CCST.1993.386832","url":null,"abstract":"Based on the concept of public key distribution (PKD), a new practical design for a secure broadcasting system is proposed. The proposed secure broadcast cryptosystem is based on the Diffie-Hellman public key distribution concept. The communication key is hidden with the RSA scheme. The security of the cryptosystem is therefore the same as that of the RSA scheme. The single key concept is used to reduce the load of additional control messages.<<ETX>>","PeriodicalId":404786,"journal":{"name":"1993 Proceedings of IEEE International Carnahan Conference on Security Technology","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127883840","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Verifying system security using Petri Nets 使用Petri网验证系统安全性
Pub Date : 1993-10-13 DOI: 10.1109/CCST.1993.386794
S. Castano, P. Samarati, C. Villa
A tool for verifying security properties of data is described, based on colored Petri nets. A conceptual data model for complex applications and a mandatory security model based on the principles of Bell-LaPadula are presented. The tool operates on such models, using the Petri net analysis techniques, based on the reachability graph. The absence of interference of sensitive associations, the reachability of information, and the temporal relationships among data access properties are studied, and conditions on the reachability graph are defined, to guarantee that such properties hold in the system.<>
描述了一种基于彩色Petri网的验证数据安全属性的工具。提出了一个复杂应用的概念数据模型和一个基于Bell-LaPadula原理的强制安全模型。该工具在这些模型上运行,使用Petri网分析技术,基于可达性图。研究了敏感关联的无干扰性、信息的可达性以及数据访问属性之间的时间关系,并定义了可达图的条件,以保证这些属性在系统中保持
{"title":"Verifying system security using Petri Nets","authors":"S. Castano, P. Samarati, C. Villa","doi":"10.1109/CCST.1993.386794","DOIUrl":"https://doi.org/10.1109/CCST.1993.386794","url":null,"abstract":"A tool for verifying security properties of data is described, based on colored Petri nets. A conceptual data model for complex applications and a mandatory security model based on the principles of Bell-LaPadula are presented. The tool operates on such models, using the Petri net analysis techniques, based on the reachability graph. The absence of interference of sensitive associations, the reachability of information, and the temporal relationships among data access properties are studied, and conditions on the reachability graph are defined, to guarantee that such properties hold in the system.<<ETX>>","PeriodicalId":404786,"journal":{"name":"1993 Proceedings of IEEE International Carnahan Conference on Security Technology","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134539463","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A dynamic access control model for object-oriented system 面向对象系统的动态访问控制模型
Pub Date : 1993-10-13 DOI: 10.1109/CCST.1993.386806
P. Deng, C. Kuo, V. Kao
The authors propose a dynamic access control model (DACM) to meet the access control requirements of an environment that frequently changes and adjusts user access privileges and/or target object confidential level. For the DACM, one uses an object-oriented technique to describe the whole model and also to implement its access control mechanism called the dynamic access control system. A real case similar to the DACM has been implemented in the Administration Information System of the Central Police University. The performance shown in this case is quite good from the viewpoint of the end user and system developers/maintainers. The DACM technique can be used to cope with a dynamically changing environment.<>
作者提出了一种动态访问控制模型(DACM),以满足频繁变化和调整用户访问权限和/或目标对象机密级别的环境的访问控制需求。对于DACM,使用面向对象的技术来描述整个模型,并实现其访问控制机制,称为动态访问控制系统。在中央警察大学的行政信息系统中,已经实现了一个类似于DACM的实际案例。从最终用户和系统开发人员/维护人员的角度来看,本例中显示的性能相当不错。DACM技术可用于应对动态变化的环境。
{"title":"A dynamic access control model for object-oriented system","authors":"P. Deng, C. Kuo, V. Kao","doi":"10.1109/CCST.1993.386806","DOIUrl":"https://doi.org/10.1109/CCST.1993.386806","url":null,"abstract":"The authors propose a dynamic access control model (DACM) to meet the access control requirements of an environment that frequently changes and adjusts user access privileges and/or target object confidential level. For the DACM, one uses an object-oriented technique to describe the whole model and also to implement its access control mechanism called the dynamic access control system. A real case similar to the DACM has been implemented in the Administration Information System of the Central Police University. The performance shown in this case is quite good from the viewpoint of the end user and system developers/maintainers. The DACM technique can be used to cope with a dynamically changing environment.<<ETX>>","PeriodicalId":404786,"journal":{"name":"1993 Proceedings of IEEE International Carnahan Conference on Security Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123952688","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Advanced passive infrared presence detectors as key elements in integrated security and building automation systems 先进的被动红外存在探测器是综合安防和楼宇自动化系统的关键元件
Pub Date : 1993-10-13 DOI: 10.1109/CCST.1993.386821
H. Keller
The role of the passive infrared (PIR) motion detector is reviewed. It is noted that, currently, it is peripheral component of security systems, installed to overlook a specific area. Future needs for integrated building automation systems require more powerful sensors that approach true presence detection, in order to provide the basic information from every room: the presence of people. From such detectors, a complete picture of occupancy of a building is obtained which meets the needs of a security system as well as energy control and safety. A highly sophisticated self-learning sensor technology has been developed for these requirements. Several thousand detectors have been installed over the last few years in various buildings, with excellent results.<>
综述了被动红外(PIR)运动探测器的作用。值得注意的是,目前,它是安全系统的外围组成部分,安装用于监视特定区域。未来对综合楼宇自动化系统的需求需要更强大的传感器来实现真实存在检测,以便提供来自每个房间的基本信息:人的存在。通过这种探测器,可以获得建筑物占用情况的完整图像,从而满足安防系统以及能源控制和安全的需要。针对这些要求,开发了一种高度复杂的自学习传感器技术。在过去的几年里,数千个探测器被安装在不同的建筑物中,效果非常好
{"title":"Advanced passive infrared presence detectors as key elements in integrated security and building automation systems","authors":"H. Keller","doi":"10.1109/CCST.1993.386821","DOIUrl":"https://doi.org/10.1109/CCST.1993.386821","url":null,"abstract":"The role of the passive infrared (PIR) motion detector is reviewed. It is noted that, currently, it is peripheral component of security systems, installed to overlook a specific area. Future needs for integrated building automation systems require more powerful sensors that approach true presence detection, in order to provide the basic information from every room: the presence of people. From such detectors, a complete picture of occupancy of a building is obtained which meets the needs of a security system as well as energy control and safety. A highly sophisticated self-learning sensor technology has been developed for these requirements. Several thousand detectors have been installed over the last few years in various buildings, with excellent results.<<ETX>>","PeriodicalId":404786,"journal":{"name":"1993 Proceedings of IEEE International Carnahan Conference on Security Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129746791","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Analysis and selection of communication security equipment 通信安全设备的分析与选择
Pub Date : 1993-10-13 DOI: 10.1109/CCST.1993.386800
G. M. Barney
The author addresses criteria for selecting communications security (COMSEC) equipment into existing and planned communications systems. Specific areas addressed include needs, threats, value of information, response to threats, user interface issues, key management considerations, cryptographic types, future requirements, compatibility, special COMSEC characteristics, host nation connection approvals, maintenance approaches, standard security attributes, practical realities, and future trends.<>
作者讨论了选择通信安全(COMSEC)设备进入现有和计划的通信系统的标准。具体涉及的领域包括需求、威胁、信息价值、对威胁的响应、用户界面问题、密钥管理考虑、加密类型、未来需求、兼容性、COMSEC特殊特性、东道国连接批准、维护方法、标准安全属性、实际情况和未来趋势。
{"title":"Analysis and selection of communication security equipment","authors":"G. M. Barney","doi":"10.1109/CCST.1993.386800","DOIUrl":"https://doi.org/10.1109/CCST.1993.386800","url":null,"abstract":"The author addresses criteria for selecting communications security (COMSEC) equipment into existing and planned communications systems. Specific areas addressed include needs, threats, value of information, response to threats, user interface issues, key management considerations, cryptographic types, future requirements, compatibility, special COMSEC characteristics, host nation connection approvals, maintenance approaches, standard security attributes, practical realities, and future trends.<<ETX>>","PeriodicalId":404786,"journal":{"name":"1993 Proceedings of IEEE International Carnahan Conference on Security Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123793392","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Smart card, computer security, access control, cryptology 智能卡,计算机安全,访问控制,密码学
Pub Date : 1993-10-13 DOI: 10.1109/CCST.1993.386807
A. Spesivtsev, V. Wegner, A. Krytjakov, V. Seregin, V. Sidorov
An alternative approach to applications which need expensive smart cards with cryptoprocessors is suggested. The idea is to perform cryptographic features in special smart card reading devices. Thus, the price of data protection and access control in computing systems and networks may be substantially reduced. In most applications cheap EEPROM smart cards can be used instead of microprocessor cards.<>
对于需要昂贵的带有加密处理器的智能卡的应用,提出了一种替代方法。这个想法是在特殊的智能卡读取设备中执行加密功能。因此,计算系统和网络中的数据保护和访问控制的价格可能会大大降低。在大多数应用中,廉价的EEPROM智能卡可以代替微处理器卡。
{"title":"Smart card, computer security, access control, cryptology","authors":"A. Spesivtsev, V. Wegner, A. Krytjakov, V. Seregin, V. Sidorov","doi":"10.1109/CCST.1993.386807","DOIUrl":"https://doi.org/10.1109/CCST.1993.386807","url":null,"abstract":"An alternative approach to applications which need expensive smart cards with cryptoprocessors is suggested. The idea is to perform cryptographic features in special smart card reading devices. Thus, the price of data protection and access control in computing systems and networks may be substantially reduced. In most applications cheap EEPROM smart cards can be used instead of microprocessor cards.<<ETX>>","PeriodicalId":404786,"journal":{"name":"1993 Proceedings of IEEE International Carnahan Conference on Security Technology","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124871696","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Using smart cards to authenticate passwords 使用智能卡验证密码
Pub Date : 1993-10-13 DOI: 10.1109/CCST.1993.386808
C. Chang, Ren-Junn Hwang, D. Buehrer
A password authentication scheme which can verify remote passwords without the use of a verification table is presented. Each user possesses a smart card which is used for login and authentication, as introduced by A. Shamir (1985). During the login, the user types in his identity and the password associated with his smart card, along with the identity of the other user with whom he wishes to communicate. The smartcard uses a signature scheme to check whether or not the login can be accepted. As well as modifying Shamir's algorithm for the signature scheme checking by using a theorem about relatively prime numbers, one also adds communication timestamps to prevent replaying of a previously intercepted login request.<>
提出了一种无需使用验证表即可对远程密码进行验证的密码认证方案。每个用户都拥有一张智能卡,用于登录和身份验证,这是a . Shamir(1985)提出的。在登录期间,用户输入他的身份和与他的智能卡相关联的密码,以及他希望与之通信的其他用户的身份。智能卡使用签名方案来检查登录是否可以被接受。除了使用关于相对素数的定理修改Shamir的签名方案检查算法外,还添加了通信时间戳,以防止先前截获的登录请求重播。
{"title":"Using smart cards to authenticate passwords","authors":"C. Chang, Ren-Junn Hwang, D. Buehrer","doi":"10.1109/CCST.1993.386808","DOIUrl":"https://doi.org/10.1109/CCST.1993.386808","url":null,"abstract":"A password authentication scheme which can verify remote passwords without the use of a verification table is presented. Each user possesses a smart card which is used for login and authentication, as introduced by A. Shamir (1985). During the login, the user types in his identity and the password associated with his smart card, along with the identity of the other user with whom he wishes to communicate. The smartcard uses a signature scheme to check whether or not the login can be accepted. As well as modifying Shamir's algorithm for the signature scheme checking by using a theorem about relatively prime numbers, one also adds communication timestamps to prevent replaying of a previously intercepted login request.<<ETX>>","PeriodicalId":404786,"journal":{"name":"1993 Proceedings of IEEE International Carnahan Conference on Security Technology","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126955252","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
期刊
1993 Proceedings of IEEE International Carnahan Conference on Security Technology
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1