首页 > 最新文献

2009 First International Workshop on Requirements Engineering for e-Voting Systems最新文献

英文 中文
Early Requirements for Mechanical Voting Systems 机械投票系统的早期要求
Douglas W. Jones
The problem of setting the requirements for voting systems is as old as democracy. With the advent of voting machinery in the 19th century, the problem became more difficult. In most cases, it was the technologists who set out to formally articulate requirements. In many cases, these are clearly stated, as such, in patent applications of the era. Sadly, some of these requirements have been repeatedly forgotten in subsequent years. By the early 20th century, several authors produced concise summaries of these requirements, but their efforts reflect strong vendor bias.
为选举制度设定条件的问题与民主一样古老。随着19世纪投票机器的出现,这个问题变得更加困难。在大多数情况下,是技术人员开始正式阐明需求。在许多情况下,这些在时代的专利申请中都清楚地说明了。遗憾的是,其中一些要求在随后的几年里一再被遗忘。到20世纪初,一些作者对这些需求做了简明的总结,但是他们的努力反映了强烈的供应商偏见。
{"title":"Early Requirements for Mechanical Voting Systems","authors":"Douglas W. Jones","doi":"10.1109/RE-VOTE.2009.3","DOIUrl":"https://doi.org/10.1109/RE-VOTE.2009.3","url":null,"abstract":"The problem of setting the requirements for voting systems is as old as democracy. With the advent of voting machinery in the 19th century, the problem became more difficult. In most cases, it was the technologists who set out to formally articulate requirements. In many cases, these are clearly stated, as such, in patent applications of the era. Sadly, some of these requirements have been repeatedly forgotten in subsequent years. By the early 20th century, several authors produced concise summaries of these requirements, but their efforts reflect strong vendor bias.","PeriodicalId":432365,"journal":{"name":"2009 First International Workshop on Requirements Engineering for e-Voting Systems","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126541374","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Specification of a Voting Service Provider 投票服务提供商规范
Axel Schmidt, L. Langer, J. Buchmann, M. Volkamer
Service Provider for remote electronic elections. [8] introduced the concept of the Voting Service Provider, a professional and qualified trusted third party which operates a secure remote electronic election on behalf of the election host. The intention is to release the election host of the complex operation of an electronic voting system thereby enabling secure and practical electronic elections. In this paper we consider a specific election scenario to specify a Voting Service Provider in detail. We show how its architecture and processes have to be set up in this scenario. We propose safeguards for the implementation of the security requirements towards the operational environment based on IT-Grundschutz. Our specification shows how to put the Voting Service Provider concept into practice. Additionally, it can be used as a basis for evaluation purposes.
远程电子选举服务提供商。[8]引入了投票服务提供商(Voting Service Provider)的概念,这是一个专业的、合格的、受信任的第三方,代表选举主办方进行安全的远程电子选举。这样做的目的是使选举主办者不必进行电子投票系统的复杂操作,从而能够进行安全和实际的电子选举。在本文中,我们考虑一个特定的选举场景来详细指定投票服务提供商。我们将展示如何在此场景中设置其体系结构和流程。我们提出了基于IT-Grundschutz的操作环境安全需求实现的保障措施。我们的规范展示了如何将投票服务提供者概念付诸实践。此外,它可以用作评估目的的基础。
{"title":"Specification of a Voting Service Provider","authors":"Axel Schmidt, L. Langer, J. Buchmann, M. Volkamer","doi":"10.1109/RE-VOTE.2009.8","DOIUrl":"https://doi.org/10.1109/RE-VOTE.2009.8","url":null,"abstract":"Service Provider for remote electronic elections. [8] introduced the concept of the Voting Service Provider, a professional and qualified trusted third party which operates a secure remote electronic election on behalf of the election host. The intention is to release the election host of the complex operation of an electronic voting system thereby enabling secure and practical electronic elections. In this paper we consider a specific election scenario to specify a Voting Service Provider in detail. We show how its architecture and processes have to be set up in this scenario. We propose safeguards for the implementation of the security requirements towards the operational environment based on IT-Grundschutz. Our specification shows how to put the Voting Service Provider concept into practice. Additionally, it can be used as a basis for evaluation purposes.","PeriodicalId":432365,"journal":{"name":"2009 First International Workshop on Requirements Engineering for e-Voting Systems","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1899-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116654018","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Managing Requirements for E-Voting Systems: Issues and Approaches 管理电子投票系统的需求:问题和方法
Komminist Weldemariam, Andrea Mattioli, Adolfo Villafiorita
This paper discusses our approach and experiences on structuring and maintaining requirements for an e-voting system we have built and deployed for elections. Issues related to integrating laws and recommendation for e-voting systems, managing different elections and configurations, supporting a spiral development, yielded problems and approaches to help maintain integrity of requirements and a coherent view of the system. Moreover, the relationship between requirements and system architecture is based on finite state machines, that bridge the gap between the laws and the actual behavior of the machine.
本文讨论了我们为选举构建和部署的电子投票系统的结构和维护需求的方法和经验。与整合电子投票系统的法律和建议、管理不同的选举和配置、支持螺旋式发展相关的问题产生了一些问题和方法,以帮助保持需求的完整性和系统的一致性。此外,需求和系统架构之间的关系是基于有限状态机的,它在定律和机器的实际行为之间架起了桥梁。
{"title":"Managing Requirements for E-Voting Systems: Issues and Approaches","authors":"Komminist Weldemariam, Andrea Mattioli, Adolfo Villafiorita","doi":"10.1109/RE-VOTE.2009.7","DOIUrl":"https://doi.org/10.1109/RE-VOTE.2009.7","url":null,"abstract":"This paper discusses our approach and experiences on structuring and maintaining requirements for an e-voting system we have built and deployed for elections. Issues related to integrating laws and recommendation for e-voting systems, managing different elections and configurations, supporting a spiral development, yielded problems and approaches to help maintain integrity of requirements and a coherent view of the system. Moreover, the relationship between requirements and system architecture is based on finite state machines, that bridge the gap between the laws and the actual behavior of the machine.","PeriodicalId":432365,"journal":{"name":"2009 First International Workshop on Requirements Engineering for e-Voting Systems","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1899-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126289312","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Electronic Elections: Trust Through Engineering 电子选举:通过工程的信任
C. Schürmann
It comes with many risks but brings also many benefits. Instead of flat out rejecting the technology as uncontrollably dangerous, we advocate in this paper a different technological angle that renders electronic elections trustworthy beyond the usual levels of doubt. We exploit the trust that voters currently have into the democratic process and model our techniques around that observation accordingly. In particular, we propose a technique of trace emitting computations to record the individual steps of an electronic voting machine for a posteriori validation on an acceptably small trusted computing base. Our technology enables us to prove that an electronic elections preserves the voter's intent, assuming that the voting machine and the trace verifier are independent.
它带来了很多风险,但也带来了很多好处。我们并没有直截了当地将这项技术视为无法控制的危险,而是在本文中提倡一种不同的技术角度,使电子选举超越通常的怀疑程度,变得值得信赖。我们利用选民目前对民主进程的信任,并相应地围绕这种观察建立我们的技术模型。特别是,我们提出了一种跟踪发射计算技术来记录电子投票机的各个步骤,以便在可接受的小可信计算基础上进行后验验证。我们的技术使我们能够证明电子选举保留了选民的意图,假设投票机和跟踪验证器是独立的。
{"title":"Electronic Elections: Trust Through Engineering","authors":"C. Schürmann","doi":"10.1109/RE-VOTE.2009.4","DOIUrl":"https://doi.org/10.1109/RE-VOTE.2009.4","url":null,"abstract":"It comes with many risks but brings also many benefits. Instead of flat out rejecting the technology as uncontrollably dangerous, we advocate in this paper a different technological angle that renders electronic elections trustworthy beyond the usual levels of doubt. We exploit the trust that voters currently have into the democratic process and model our techniques around that observation accordingly. In particular, we propose a technique of trace emitting computations to record the individual steps of an electronic voting machine for a posteriori validation on an acceptably small trusted computing base. Our technology enables us to prove that an electronic elections preserves the voter's intent, assuming that the voting machine and the trace verifier are independent.","PeriodicalId":432365,"journal":{"name":"2009 First International Workshop on Requirements Engineering for e-Voting Systems","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1899-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121450283","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Towards a Framework on the Security Requirements for Electronic Voting Protocols 电子投票协议安全要求框架研究
L. Langer, Axel Schmidt, J. Buchmann, M. Volkamer, Alexander Stolfik
Electronic voting schemes are expected to meet the basic security requirements for electronic voting. However, very different opinions about these requirements exist in the e-voting community. This is due to the fact that the security requirements comprise different levels at which they can be met. For example, universal verifiability may, or may not, include verifying eligibility of the voters who participated in the election. This paper provides definitions of different levels of election secrecy and verifiability. We also investigate whether there exists an order for the different levels and provide adversary models. The resulting compilation is useful since it may not be necessary, or even possible, to achieve the maximum level for all the security requirements in parallel. Thus, appropriate levels of the requirements can be selected for different types of elections, e.g. parliamentary elections vs. elections in associations.
电子投票计划预期可符合电子投票的基本保安要求。然而,在电子投票社区中,对这些要求存在着非常不同的意见。这是因为安全需求包含可以满足的不同级别。例如,普遍可验证性可能包括,也可能不包括,验证参加选举的选民的资格。本文给出了不同级别的选举保密性和可验证性的定义。我们还研究了是否存在不同级别的顺序,并提供了对手模型。结果编译是有用的,因为它可能没有必要,甚至不可能同时达到所有安全需求的最大级别。因此,可以为不同类型的选举选择适当的要求水平,例如议会选举与协会选举。
{"title":"Towards a Framework on the Security Requirements for Electronic Voting Protocols","authors":"L. Langer, Axel Schmidt, J. Buchmann, M. Volkamer, Alexander Stolfik","doi":"10.1109/RE-VOTE.2009.9","DOIUrl":"https://doi.org/10.1109/RE-VOTE.2009.9","url":null,"abstract":"Electronic voting schemes are expected to meet the basic security requirements for electronic voting. However, very different opinions about these requirements exist in the e-voting community. This is due to the fact that the security requirements comprise different levels at which they can be met. For example, universal verifiability may, or may not, include verifying eligibility of the voters who participated in the election. This paper provides definitions of different levels of election secrecy and verifiability. We also investigate whether there exists an order for the different levels and provide adversary models. The resulting compilation is useful since it may not be necessary, or even possible, to achieve the maximum level for all the security requirements in parallel. Thus, appropriate levels of the requirements can be selected for different types of elections, e.g. parliamentary elections vs. elections in associations.","PeriodicalId":432365,"journal":{"name":"2009 First International Workshop on Requirements Engineering for e-Voting Systems","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1899-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129571773","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Determine the Resilience of Evaluated Internet Voting Systems 确定评估的互联网投票系统的弹性
M. Volkamer, Rüdiger Grimm
Internet voting gets more and more popular. It is generally accepted that an Internet voting system needs to be evaluated. The existing evaluation frameworks try to be as system-independent as possible. Because of that distributed trust concepts like separation of duty for the voting servers, four eyes principle for administrators and the election commission, as well as the multiplicity of control functions like for the counting of votes cannot be demanded precisely. This article proposes to extend the evaluation of Internet voting systems by the computation of a so called k-resilience value. This value defines the robustness of a system and helps to identify vulnerabilities. Besides the introduction and discussion of this value, it is computed for existing Internet voting
网络投票越来越受欢迎。人们普遍认为,网络投票系统需要评估。现有的评估框架试图尽可能独立于系统。正因为如此,分布式信任的概念,如投票服务器的职责分离、管理人员和选举委员会的四眼原则,以及计票等控制功能的多样性,都不能被精确地要求。本文提出通过计算所谓的k-弹性值来扩展互联网投票系统的评估。该值定义了系统的健壮性,并有助于识别漏洞。除了对该值的介绍和讨论外,还对现有的网络投票进行了计算
{"title":"Determine the Resilience of Evaluated Internet Voting Systems","authors":"M. Volkamer, Rüdiger Grimm","doi":"10.1109/RE-VOTE.2009.2","DOIUrl":"https://doi.org/10.1109/RE-VOTE.2009.2","url":null,"abstract":"Internet voting gets more and more popular. It is generally accepted that an Internet voting system needs to be evaluated. The existing evaluation frameworks try to be as system-independent as possible. Because of that distributed trust concepts like separation of duty for the voting servers, four eyes principle for administrators and the election commission, as well as the multiplicity of control functions like for the counting of votes cannot be demanded precisely. This article proposes to extend the evaluation of Internet voting systems by the computation of a so called k-resilience value. This value defines the robustness of a system and helps to identify vulnerabilities. Besides the introduction and discussion of this value, it is computed for existing Internet voting","PeriodicalId":432365,"journal":{"name":"2009 First International Workshop on Requirements Engineering for e-Voting Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1899-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122449274","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 28
Improving Voting System Event Logs 改进投票系统事件日志
Andrea L. Mascher, P. Cotton, Douglas W. Jones
Federal standards require that electronic voting machines log information about the voting system behavior to support post-election audits and investigations. Our study examines what additional voter interaction information should be collected to allow investigation of human factors issues of the voting systems used in an election, while at the same time preserving voter privacy. We have focused on simulating touch screen interface errors that have been hypothesized as the cause of problems in past elections, such as miscalibration and insensitivity. The preliminary data gathered indicates that event logs which record voter interaction information may allow investigators to detect the existence of interface problems in deployed voting systems. This information can be collected without compromising secret ballot rights. We believe that any voting system using a touch screen interface could benefit by logging these events.
联邦标准要求电子投票机记录有关投票系统行为的信息,以支持选举后的审计和调查。我们的研究考察了应该收集哪些额外的选民互动信息,以便调查选举中使用的投票系统的人为因素问题,同时保护选民的隐私。我们专注于模拟触摸屏界面错误,这些错误被认为是过去选举中出现问题的原因,例如校准错误和不敏感。收集的初步数据表明,记录选民互动信息的事件日志可能使调查人员能够发现部署的投票系统中存在的接口问题。这些信息可以在不损害无记名投票权的情况下收集。我们相信任何使用触摸屏界面的投票系统都可以通过记录这些事件而受益。
{"title":"Improving Voting System Event Logs","authors":"Andrea L. Mascher, P. Cotton, Douglas W. Jones","doi":"10.1109/RE-VOTE.2009.6","DOIUrl":"https://doi.org/10.1109/RE-VOTE.2009.6","url":null,"abstract":"Federal standards require that electronic voting machines log information about the voting system behavior to support post-election audits and investigations. Our study examines what additional voter interaction information should be collected to allow investigation of human factors issues of the voting systems used in an election, while at the same time preserving voter privacy. We have focused on simulating touch screen interface errors that have been hypothesized as the cause of problems in past elections, such as miscalibration and insensitivity. The preliminary data gathered indicates that event logs which record voter interaction information may allow investigators to detect the existence of interface problems in deployed voting systems. This information can be collected without compromising secret ballot rights. We believe that any voting system using a touch screen interface could benefit by logging these events.","PeriodicalId":432365,"journal":{"name":"2009 First International Workshop on Requirements Engineering for e-Voting Systems","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1899-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121054134","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Experiences Gained from the first Prêt à Voter Implementation 从第一次Prêt选民实施中获得的经验
D. Bismark, J. Heather, R. Peel, Steve A. Schneider, Zhe Xia, P. Ryan
Implementing an electronic voting system for the first time can be difficult, since requirements are sometimes hard to specify and keep changing, resources are scarce in an academic setting, the gap between theory and practice is wider than anticipated, adhering to a formal development lifecycle is inconvenient and delivery on time is very hard. This paper describes all of the work done by the Pr^et `a Voter team in the run-up to VoComp in 2007 and enumerates a number of lessons learned.
第一次实现电子投票系统可能会很困难,因为需求有时很难指定并且不断变化,学术环境中的资源是稀缺的,理论与实践之间的差距比预期的要大,坚持正式的开发生命周期是不方便的,并且按时交付非常困难。本文描述了Pr^et ' a Voter团队在2007年VoComp筹备阶段所做的所有工作,并列举了一些经验教训。
{"title":"Experiences Gained from the first Prêt à Voter Implementation","authors":"D. Bismark, J. Heather, R. Peel, Steve A. Schneider, Zhe Xia, P. Ryan","doi":"10.1109/RE-VOTE.2009.5","DOIUrl":"https://doi.org/10.1109/RE-VOTE.2009.5","url":null,"abstract":"Implementing an electronic voting system for the first time can be difficult, since requirements are sometimes hard to specify and keep changing, resources are scarce in an academic setting, the gap between theory and practice is wider than anticipated, adhering to a formal development lifecycle is inconvenient and delivery on time is very hard. This paper describes all of the work done by the Pr^et `a Voter team in the run-up to VoComp in 2007 and enumerates a number of lessons learned.","PeriodicalId":432365,"journal":{"name":"2009 First International Workshop on Requirements Engineering for e-Voting Systems","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1899-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127519337","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
A Risk Assessment Model for Voting Systems using Threat Trees and Monte Carlo Simulation 基于威胁树和蒙特卡罗模拟的投票系统风险评估模型
J. Pardue, J. Landry, Alec Yasinsac
There continues to be a requirement for better models, tools, and techniques for conducting risk assessment of voting systems. We propose a model of risk and a technique for risk assessment, which builds on threat trees and Monte Carlo simulation. The goal is to provide a means of facilitating informed decisions regarding voting system security standards through a rational and parsimonious quantification of intuition or estimation of risk. Such a means should support an evaluation of trade-offs, sensitivity analysis, cost-benefit analysis, and estimation of residual risk of current and proposed voting systems, technologies and controls.
人们仍然需要更好的模型、工具和技术来对投票系统进行风险评估。我们提出了一种基于威胁树和蒙特卡罗模拟的风险模型和风险评估技术。目标是提供一种方法,通过对直觉或风险估计的理性和简约的量化,促进有关投票系统安全标准的明智决策。这种方法应支持权衡评估、敏感性分析、成本效益分析以及对当前和提议的投票系统、技术和控制的剩余风险的估计。
{"title":"A Risk Assessment Model for Voting Systems using Threat Trees and Monte Carlo Simulation","authors":"J. Pardue, J. Landry, Alec Yasinsac","doi":"10.1109/RE-VOTE.2009.1","DOIUrl":"https://doi.org/10.1109/RE-VOTE.2009.1","url":null,"abstract":"There continues to be a requirement for better models, tools, and techniques for conducting risk assessment of voting systems. We propose a model of risk and a technique for risk assessment, which builds on threat trees and Monte Carlo simulation. The goal is to provide a means of facilitating informed decisions regarding voting system security standards through a rational and parsimonious quantification of intuition or estimation of risk. Such a means should support an evaluation of trade-offs, sensitivity analysis, cost-benefit analysis, and estimation of residual risk of current and proposed voting systems, technologies and controls.","PeriodicalId":432365,"journal":{"name":"2009 First International Workshop on Requirements Engineering for e-Voting Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1899-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128999867","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
期刊
2009 First International Workshop on Requirements Engineering for e-Voting Systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1