首页 > 最新文献

1993 Proceedings of IEEE International Carnahan Conference on Security Technology最新文献

英文 中文
Two complementary approaches to the full identification of automobile paints 两种互补的方法来全面识别汽车油漆
Pub Date : 1993-10-13 DOI: 10.1109/CCST.1993.386817
Y. Giang, W.-T. Chang, Y.-J. Wang, Ping-Chen Tsai, C.-W. Huang
Pyrolysis/gas chromatography (Py-GC) and scanning electron microscope/energy dispersive X-ray spectrometry (SEM/EDX) are two commonly used methods for the identification of automobile paints. Some modifications were made on the conventional Py-GC to improve its discriminating power. Twelve exemplar samples of similar white remedy paint chip were unambiguously differentiated using this method. To further enhance the evidential value of automobile paints, nondestructive and convenient SEM/EDX is recommended whenever needed.<>
热解/气相色谱法(Py-GC)和扫描电镜/能量色散x射线光谱法(SEM/EDX)是鉴定汽车涂料常用的两种方法。对传统的Py-GC进行了改进,提高了其识别能力。用该方法对12个同类白色补救漆片样品进行了明确的鉴别。为了进一步提高汽车涂料的证据价值,建议在需要时使用无损且方便的SEM/EDX。
{"title":"Two complementary approaches to the full identification of automobile paints","authors":"Y. Giang, W.-T. Chang, Y.-J. Wang, Ping-Chen Tsai, C.-W. Huang","doi":"10.1109/CCST.1993.386817","DOIUrl":"https://doi.org/10.1109/CCST.1993.386817","url":null,"abstract":"Pyrolysis/gas chromatography (Py-GC) and scanning electron microscope/energy dispersive X-ray spectrometry (SEM/EDX) are two commonly used methods for the identification of automobile paints. Some modifications were made on the conventional Py-GC to improve its discriminating power. Twelve exemplar samples of similar white remedy paint chip were unambiguously differentiated using this method. To further enhance the evidential value of automobile paints, nondestructive and convenient SEM/EDX is recommended whenever needed.<<ETX>>","PeriodicalId":404786,"journal":{"name":"1993 Proceedings of IEEE International Carnahan Conference on Security Technology","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127592555","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Securing a global village and its resources: Baseline security for interconnected Signaling System #7 telecommunications networks 保护地球村及其资源:互连信令系统#7电信网络的基线安全性
Pub Date : 1993-10-13 DOI: 10.1109/CCST.1993.386804
H. Kluepfel
The authors describes recent experience in countering the growing problem of network integrity security threats. He outlines the need for a security baseline standard for all SS7 (Signaling System #7) networked service providers. In describing the evolving intrusion threats to the global public network, he defines and comments on the seriousness of the problem. The important concept emphasized is that all service providers on the SS7 network may be placed at risk by the absence of effective security mechanisms in any one service provider's SS7 domain. The focus of the present work is to help define a baseline standard of due care on security applicable to any interconnectd SS7 service provider's or customer network to create a global industry equivalent to national and international trusted computer security evaluation criteria.<>
作者描述了最近在应对日益严重的网络完整性安全威胁问题方面的经验。他概述了为所有SS7(信令系统#7)网络服务提供商制定安全基线标准的必要性。在描述全球公共网络不断演变的入侵威胁时,他定义并评论了问题的严重性。强调的重要概念是,如果任何一个服务提供商的SS7域缺乏有效的安全机制,SS7网络上的所有服务提供商都可能处于危险之中。目前工作的重点是帮助定义一个适用于任何互连的SS7服务提供商或客户网络的安全应有注意的基线标准,以创建一个相当于国家和国际可信计算机安全评估标准的全球行业
{"title":"Securing a global village and its resources: Baseline security for interconnected Signaling System #7 telecommunications networks","authors":"H. Kluepfel","doi":"10.1109/CCST.1993.386804","DOIUrl":"https://doi.org/10.1109/CCST.1993.386804","url":null,"abstract":"The authors describes recent experience in countering the growing problem of network integrity security threats. He outlines the need for a security baseline standard for all SS7 (Signaling System #7) networked service providers. In describing the evolving intrusion threats to the global public network, he defines and comments on the seriousness of the problem. The important concept emphasized is that all service providers on the SS7 network may be placed at risk by the absence of effective security mechanisms in any one service provider's SS7 domain. The focus of the present work is to help define a baseline standard of due care on security applicable to any interconnectd SS7 service provider's or customer network to create a global industry equivalent to national and international trusted computer security evaluation criteria.<<ETX>>","PeriodicalId":404786,"journal":{"name":"1993 Proceedings of IEEE International Carnahan Conference on Security Technology","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117272109","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Development of computer-aided design software with standards for security engineering 安全工程标准计算机辅助设计软件的开发
Pub Date : 1993-10-13 DOI: 10.1109/CCST.1993.386795
A. Antelman, A. Miller, E. Rao
The authors give an overview of the development of computer-aided design (CAD) software with standards for security engineering. The intent of the developed software is to increase design productivity and generate CAD standards for security engineering.<>
本文综述了计算机辅助设计(CAD)软件在安全工程领域的发展。开发软件的目的是提高设计效率,并为安全工程生成CAD标准。
{"title":"Development of computer-aided design software with standards for security engineering","authors":"A. Antelman, A. Miller, E. Rao","doi":"10.1109/CCST.1993.386795","DOIUrl":"https://doi.org/10.1109/CCST.1993.386795","url":null,"abstract":"The authors give an overview of the development of computer-aided design (CAD) software with standards for security engineering. The intent of the developed software is to increase design productivity and generate CAD standards for security engineering.<<ETX>>","PeriodicalId":404786,"journal":{"name":"1993 Proceedings of IEEE International Carnahan Conference on Security Technology","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121402143","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
CCTV systems; adding value with new technology 闭路电视系统;用新技术增加价值
Pub Date : 1993-10-13 DOI: 10.1109/CCST.1993.386829
N. Custance
The author examines the impact which new technologies and techniques will have upon both existing and future closed-circuit television (CCTV) systems. He considers devices ranging from video entry phones to advanced surveillance cameras and proposes ways in which value can be added by extending the range of functions which the devices can perform. Examples are presented which show how the value of CCTV systems will increase through the expansion of the basic imaging capability or through the use of CCTV within new, complex devices. Particular attention is given to the video entry phone and similar devices, where end users should expect to see products with much more flexibility and more functions. It is further noted that advances in computer technology will continue to impact upon the facilities and functions which operators have at their disposal, making through increased operator efficiency. Advanced surveillance camera systems are also considered.<>
作者审查了新技术和技术将对现有和未来的闭路电视系统产生的影响。他考虑了从可视电话到高级监控摄像头的各种设备,并提出了通过扩展设备可以执行的功能范围来增加价值的方法。举例说明了闭路电视系统的价值将如何通过扩展基本成像能力或通过在新的复杂设备中使用闭路电视而增加。特别要注意的是视频输入电话和类似的设备,终端用户应该期望看到具有更大灵活性和更多功能的产品。委员会进一步注意到,电脑技术的进步将继续影响操作员可使用的设施和功能,从而提高操作员的效率。先进的监控摄像系统也在考虑之列。
{"title":"CCTV systems; adding value with new technology","authors":"N. Custance","doi":"10.1109/CCST.1993.386829","DOIUrl":"https://doi.org/10.1109/CCST.1993.386829","url":null,"abstract":"The author examines the impact which new technologies and techniques will have upon both existing and future closed-circuit television (CCTV) systems. He considers devices ranging from video entry phones to advanced surveillance cameras and proposes ways in which value can be added by extending the range of functions which the devices can perform. Examples are presented which show how the value of CCTV systems will increase through the expansion of the basic imaging capability or through the use of CCTV within new, complex devices. Particular attention is given to the video entry phone and similar devices, where end users should expect to see products with much more flexibility and more functions. It is further noted that advances in computer technology will continue to impact upon the facilities and functions which operators have at their disposal, making through increased operator efficiency. Advanced surveillance camera systems are also considered.<<ETX>>","PeriodicalId":404786,"journal":{"name":"1993 Proceedings of IEEE International Carnahan Conference on Security Technology","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124555018","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Sequelagramy approach to the signature identification mixed with Chinese and English 续迹法进行中英文混合签名识别
Pub Date : 1993-10-13 DOI: 10.1109/CCST.1993.386836
C.-h. Lin, K. Chenyuan
The sequelagramy tracing method was applied to 344 signatures of English-speaking Chinese, especially those in southeast Asia. It is shown that, by looking at the sequence and/or form of letters/characters of signatures, one can obtain a positive conclusive identification of signatures without a large sample volume.<>
对344个以东南亚为中心的英语汉语签名进行了续谱追踪。研究表明,通过观察签名的字母/字符的顺序和/或形式,可以在不需要大量样本量的情况下对签名进行肯定的结论性鉴定。
{"title":"Sequelagramy approach to the signature identification mixed with Chinese and English","authors":"C.-h. Lin, K. Chenyuan","doi":"10.1109/CCST.1993.386836","DOIUrl":"https://doi.org/10.1109/CCST.1993.386836","url":null,"abstract":"The sequelagramy tracing method was applied to 344 signatures of English-speaking Chinese, especially those in southeast Asia. It is shown that, by looking at the sequence and/or form of letters/characters of signatures, one can obtain a positive conclusive identification of signatures without a large sample volume.<<ETX>>","PeriodicalId":404786,"journal":{"name":"1993 Proceedings of IEEE International Carnahan Conference on Security Technology","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129079583","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Transferring technology to the terrain 将技术转移到地形上
Pub Date : 1993-10-13 DOI: 10.1109/CCST.1993.386824
J. Howlett
The author highlights a number of areas in which designers, specifiers, and system operators of perimeter intruder detection system (PIDSs) should be careful to pay particular attention to whether the full benefits of existing technology, and new technologies can be transferred from the supplier's warehouse into reliable operational systems on site. He recommends a thorough survey in close cooperation both with the site owners and the intended system operators. Selection of a suitable system should be underpinned by rigorous testing of a number of possible options prior to making a final choice. The importance of quality control during the installation phase is stressed. A method of carrying out nondestructive tests on fences by the use of a cut simulator tool is described. This allows quick-and-easy tests to be carried out reliably by the guard force or other nontechnical staff. The present work draws on assessment, installation, and maintenance experience in the author's organization at sites throughout the United Kingdom.<>
作者强调了一些领域,在这些领域中,外围入侵检测系统(PIDSs)的设计者、说明者和系统操作员应该特别注意现有技术的全部好处,以及新技术是否可以从供应商的仓库转移到现场可靠的操作系统中。他建议在与站点所有者和预期的系统运营商密切合作的情况下进行彻底的调查。在做出最终选择之前,应该先对许多可能的选择进行严格的测试,以此来选择合适的系统。强调了安装阶段质量控制的重要性。介绍了一种利用切割模拟器工具对围栏进行无损检测的方法。这使得警卫部队或其他非技术人员可以可靠地进行快速简便的测试。目前的工作借鉴了评估,安装和维护经验,在作者的组织在整个英国的网站。
{"title":"Transferring technology to the terrain","authors":"J. Howlett","doi":"10.1109/CCST.1993.386824","DOIUrl":"https://doi.org/10.1109/CCST.1993.386824","url":null,"abstract":"The author highlights a number of areas in which designers, specifiers, and system operators of perimeter intruder detection system (PIDSs) should be careful to pay particular attention to whether the full benefits of existing technology, and new technologies can be transferred from the supplier's warehouse into reliable operational systems on site. He recommends a thorough survey in close cooperation both with the site owners and the intended system operators. Selection of a suitable system should be underpinned by rigorous testing of a number of possible options prior to making a final choice. The importance of quality control during the installation phase is stressed. A method of carrying out nondestructive tests on fences by the use of a cut simulator tool is described. This allows quick-and-easy tests to be carried out reliably by the guard force or other nontechnical staff. The present work draws on assessment, installation, and maintenance experience in the author's organization at sites throughout the United Kingdom.<<ETX>>","PeriodicalId":404786,"journal":{"name":"1993 Proceedings of IEEE International Carnahan Conference on Security Technology","volume":"1945 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129181310","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An application of neural networks to reconstruct crime scene based on non-mark theory-suspicious factors analysis 基于非标记理论-可疑因素分析的神经网络重构犯罪现场
Pub Date : 1993-10-13 DOI: 10.1109/CCST.1993.386820
C. Kou, J.-M. Shih, C.-h. Lin, Z.-D. Lee
A non-mark theory methodology for investigating crime scenes is proposed. A back propagation network model is used to analyze suspicion factors in order to setup a dynamic knowledge based to help investigators.<>
提出了一种犯罪现场调查的非标记理论方法。利用反向传播网络模型对可疑因素进行分析,建立一个动态的知识基础,为调查人员提供帮助。
{"title":"An application of neural networks to reconstruct crime scene based on non-mark theory-suspicious factors analysis","authors":"C. Kou, J.-M. Shih, C.-h. Lin, Z.-D. Lee","doi":"10.1109/CCST.1993.386820","DOIUrl":"https://doi.org/10.1109/CCST.1993.386820","url":null,"abstract":"A non-mark theory methodology for investigating crime scenes is proposed. A back propagation network model is used to analyze suspicion factors in order to setup a dynamic knowledge based to help investigators.<<ETX>>","PeriodicalId":404786,"journal":{"name":"1993 Proceedings of IEEE International Carnahan Conference on Security Technology","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121204633","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
The emerging problem of technology and fraud prevention in the 1990's 20世纪90年代出现的技术和欺诈预防问题
Pub Date : 1993-10-13 DOI: 10.1109/CCST.1993.386837
D. Brown
The development of a new security technique implemented on visa travel documents issued by the Canadian government is described. The concept was designed and developed for the Canadian government by combining emerging technologies and security printing techniques, creating a two-industry product called Enigma, the Machine Readable Security device (MRS).<>
一种新的安全技术的发展实施的签证旅行文件由加拿大政府发布的描述。这个概念是为加拿大政府设计和开发的,结合了新兴技术和安全印刷技术,创造了一个名为Enigma的两行业产品,即机器可读安全设备(MRS)。
{"title":"The emerging problem of technology and fraud prevention in the 1990's","authors":"D. Brown","doi":"10.1109/CCST.1993.386837","DOIUrl":"https://doi.org/10.1109/CCST.1993.386837","url":null,"abstract":"The development of a new security technique implemented on visa travel documents issued by the Canadian government is described. The concept was designed and developed for the Canadian government by combining emerging technologies and security printing techniques, creating a two-industry product called Enigma, the Machine Readable Security device (MRS).<<ETX>>","PeriodicalId":404786,"journal":{"name":"1993 Proceedings of IEEE International Carnahan Conference on Security Technology","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116859068","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Signal processing of gravitational field detector for prediction of large seismic waves 引力场探测器在大地震波预报中的信号处理
Pub Date : 1993-10-13 DOI: 10.1109/CCST.1993.386799
J. Chiba
The author describes the basic concept and signal processing of a gravitational field detector for prediction of large seismic waves. When the seismograph and the gravitational field detector are set at the same place, the seismograph does not respond until the arrival of the primary wave, but the gravitational field detector will respond to the gravitational field before the primary wave arrival. Therefore, a large seismic wave can be predicted according to gravitational field turbulence.<>
介绍了用于大地震波预报的引力场探测器的基本概念和信号处理。当地震仪与重力场检测器同时设置时,地震仪在主波到达前不响应,而重力场检测器在主波到达前响应重力场。因此,根据引力场湍流可以预测大的地震波。
{"title":"Signal processing of gravitational field detector for prediction of large seismic waves","authors":"J. Chiba","doi":"10.1109/CCST.1993.386799","DOIUrl":"https://doi.org/10.1109/CCST.1993.386799","url":null,"abstract":"The author describes the basic concept and signal processing of a gravitational field detector for prediction of large seismic waves. When the seismograph and the gravitational field detector are set at the same place, the seismograph does not respond until the arrival of the primary wave, but the gravitational field detector will respond to the gravitational field before the primary wave arrival. Therefore, a large seismic wave can be predicted according to gravitational field turbulence.<<ETX>>","PeriodicalId":404786,"journal":{"name":"1993 Proceedings of IEEE International Carnahan Conference on Security Technology","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115235554","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A basic study of the properties of accelerants in fire residues for better sampling in arson analysis 对火灾残留物中助燃剂的性质进行了初步研究,以便在纵火案分析中更好地取样
Pub Date : 1993-10-13 DOI: 10.1109/CCST.1993.386791
Y. Giang, W.-T. Chang, C. Wang, C.-W. Huang
Some basic physical aspects of the accelerants in fire residues and their effects on the detectability of the added accelerants were investigated based on a few simple experiments conducted on various accelerants and matrices. In order to more precisely locate the points where the accelerants have been added by the arsonist and to decide what kind of sample container can best fit the established arson analysis procedure, a series of experiments were also performed including those assisted by a dog. It is concluded that the understanding of such basic properties as the volatility, osmosis, and adsorption of accelerants in various matrices can be very helpful for arson investigators. Canine detection shows much promise in helping fire investigators more precisely locate the exact spot where the accelerants have been added by the arsonist.<>
通过对各种助燃剂和基体的简单实验,研究了助燃剂在火灾残留物中的一些基本物理性质及其对助燃剂可探测性的影响。为了更精确地定位纵火犯添加助燃剂的地点,并决定哪种样品容器最适合既定的纵火分析程序,还进行了一系列实验,包括在狗的协助下进行的实验。因此,了解促进剂在各种基质中的挥发性、渗透性和吸附性等基本性质对纵火案的调查有很大的帮助。犬类探测在帮助火灾调查人员更精确地找到纵火犯添加助燃剂的确切地点方面大有希望
{"title":"A basic study of the properties of accelerants in fire residues for better sampling in arson analysis","authors":"Y. Giang, W.-T. Chang, C. Wang, C.-W. Huang","doi":"10.1109/CCST.1993.386791","DOIUrl":"https://doi.org/10.1109/CCST.1993.386791","url":null,"abstract":"Some basic physical aspects of the accelerants in fire residues and their effects on the detectability of the added accelerants were investigated based on a few simple experiments conducted on various accelerants and matrices. In order to more precisely locate the points where the accelerants have been added by the arsonist and to decide what kind of sample container can best fit the established arson analysis procedure, a series of experiments were also performed including those assisted by a dog. It is concluded that the understanding of such basic properties as the volatility, osmosis, and adsorption of accelerants in various matrices can be very helpful for arson investigators. Canine detection shows much promise in helping fire investigators more precisely locate the exact spot where the accelerants have been added by the arsonist.<<ETX>>","PeriodicalId":404786,"journal":{"name":"1993 Proceedings of IEEE International Carnahan Conference on Security Technology","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124872448","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
1993 Proceedings of IEEE International Carnahan Conference on Security Technology
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1