首页 > 最新文献

2017 12th International Conference for Internet Technology and Secured Transactions (ICITST)最新文献

英文 中文
Security enhancements to TLS for improved national control 对TLS的安全性增强,以改进国家控制
Lamya Alqaydi, C. Yeun, E. Damiani
Establishing a secure connection is a must nowadays since a lot of transactions are being done online. For instance, it can vary from buying items from small shops into buying extremely expensive equipment online. Hence, the need for securing the sessions and e-commerce is highly required. Furthermore, any government entity will require its communication to be secured from eavesdropping and Man in The Middle (MITM) attacks. Web Threats are spreading around the world and becoming more aggressive every year. Secure Socket Layer (SSL) and Transport Layer Security (TLS) were established as a standard to encrypt the communication between the client and the server. Everyday new vulnerabilities and loopholes in the internet protocols are being discovered. Hence an enhancement to the TLS protocol is a must. This need rises since most transactions and confidential communication is done through the network. Then information security researchers and developers have to test, develop, verify and enhance the security of the network. Throughout this report a study of the TLS protocol will be highlighted and its relative security. Later, a proposed method to test different TLS protocols will be explained. Future work will include developing a prototype that will be used to test different TLS protocol versions.
建立一个安全的连接现在是必须的,因为很多交易都是在网上完成的。例如,它可以从小商店购买物品,也可以在网上购买极其昂贵的设备。因此,非常需要保护会话和电子商务。此外,任何政府实体都将要求其通信免受窃听和中间人(MITM)攻击。网络威胁正在全球范围内蔓延,并且每年都变得越来越具有攻击性。建立了安全套接字层(SSL)和传输层安全(TLS)作为客户端和服务器之间通信的加密标准。每天都有新的互联网协议漏洞被发现。因此,必须对TLS协议进行增强。由于大多数交易和机密通信都是通过网络完成的,因此这种需求会增加。信息安全研究人员和开发人员必须测试、开发、验证和增强网络的安全性。在本报告中,将重点介绍TLS协议及其相对安全性的研究。稍后,我们将介绍一种测试不同TLS协议的方法。未来的工作将包括开发一个原型,用于测试不同的TLS协议版本。
{"title":"Security enhancements to TLS for improved national control","authors":"Lamya Alqaydi, C. Yeun, E. Damiani","doi":"10.23919/ICITST.2017.8356398","DOIUrl":"https://doi.org/10.23919/ICITST.2017.8356398","url":null,"abstract":"Establishing a secure connection is a must nowadays since a lot of transactions are being done online. For instance, it can vary from buying items from small shops into buying extremely expensive equipment online. Hence, the need for securing the sessions and e-commerce is highly required. Furthermore, any government entity will require its communication to be secured from eavesdropping and Man in The Middle (MITM) attacks. Web Threats are spreading around the world and becoming more aggressive every year. Secure Socket Layer (SSL) and Transport Layer Security (TLS) were established as a standard to encrypt the communication between the client and the server. Everyday new vulnerabilities and loopholes in the internet protocols are being discovered. Hence an enhancement to the TLS protocol is a must. This need rises since most transactions and confidential communication is done through the network. Then information security researchers and developers have to test, develop, verify and enhance the security of the network. Throughout this report a study of the TLS protocol will be highlighted and its relative security. Later, a proposed method to test different TLS protocols will be explained. Future work will include developing a prototype that will be used to test different TLS protocol versions.","PeriodicalId":440665,"journal":{"name":"2017 12th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"306 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123470388","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Hybrid public key authentication for wireless sensor networks 无线传感器网络的混合公钥认证
Daehee Kim, Jaekeun Yun, Sungjun Kim
In this paper, we propose a hybrid public key authentication scheme for wireless sensor networks whose goal is to minimize energy consumption while providing public key authentication. To accomplish this goal, we employ the certificate based public key authentication scheme and the Merkle hash tree based public key authentication scheme depending on the number of sensor nodes. The simulation result shows that our proposed scheme outperforms the existing public key authentication scheme in terms of energy consumption.
本文提出了一种用于无线传感器网络的混合公钥认证方案,其目标是在提供公钥认证的同时最小化能耗。为了实现这一目标,我们根据传感器节点的数量采用了基于证书的公钥认证方案和基于Merkle哈希树的公钥认证方案。仿真结果表明,我们提出的方案在能耗方面优于现有的公钥认证方案。
{"title":"Hybrid public key authentication for wireless sensor networks","authors":"Daehee Kim, Jaekeun Yun, Sungjun Kim","doi":"10.23919/ICITST.2017.8356364","DOIUrl":"https://doi.org/10.23919/ICITST.2017.8356364","url":null,"abstract":"In this paper, we propose a hybrid public key authentication scheme for wireless sensor networks whose goal is to minimize energy consumption while providing public key authentication. To accomplish this goal, we employ the certificate based public key authentication scheme and the Merkle hash tree based public key authentication scheme depending on the number of sensor nodes. The simulation result shows that our proposed scheme outperforms the existing public key authentication scheme in terms of energy consumption.","PeriodicalId":440665,"journal":{"name":"2017 12th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126251571","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Speech encryption based on hybrid chaotic key generator for AMR-WB G.722.2 codec 基于混合混沌密钥发生器的AMR-WB G.722.2编解码器语音加密
Messaouda Boumaraf, Fatiha Merazka
In recent years, chaos-based cryptosystems have drawn more and more attention in many disciplines in particular speech encryption. In this paper, we propose speech encryption scheme based on chaos maps for AMR-WB G.722.2 Codec. To increase the security level, we combine chaos maps logistic and Hénon for shuffling and scrambling speech in order to have a hybrid chaotic key generator. The proposed algorithm evaluated with both Perceptual Evaluation of Speech Quality (PESQ) and Enhanced Modified Bark Spectral Distortion (EMBSD) measure confirm the efficiency of our proposed cryptosystem scheme.
近年来,基于混沌的密码系统在许多学科中受到越来越多的关注,尤其是语音加密。针对AMR-WB G.722.2编解码器,提出了一种基于混沌映射的语音加密方案。为了提高安全性,我们将混沌映射逻辑与hsamnon相结合,对语音进行洗牌和置乱,从而得到一个混合混沌密钥生成器。用语音质量感知评价(PESQ)和增强修正树皮频谱失真(EMBSD)度量对算法进行了评估,验证了所提密码系统方案的有效性。
{"title":"Speech encryption based on hybrid chaotic key generator for AMR-WB G.722.2 codec","authors":"Messaouda Boumaraf, Fatiha Merazka","doi":"10.23919/ICITST.2017.8356353","DOIUrl":"https://doi.org/10.23919/ICITST.2017.8356353","url":null,"abstract":"In recent years, chaos-based cryptosystems have drawn more and more attention in many disciplines in particular speech encryption. In this paper, we propose speech encryption scheme based on chaos maps for AMR-WB G.722.2 Codec. To increase the security level, we combine chaos maps logistic and Hénon for shuffling and scrambling speech in order to have a hybrid chaotic key generator. The proposed algorithm evaluated with both Perceptual Evaluation of Speech Quality (PESQ) and Enhanced Modified Bark Spectral Distortion (EMBSD) measure confirm the efficiency of our proposed cryptosystem scheme.","PeriodicalId":440665,"journal":{"name":"2017 12th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"33 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125736145","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Distributed query processing and data sharing 分布式查询处理和数据共享
Ahana Roy, Aspen Olmsted
Data privacy is becoming an increasing concern in industries where huge data repositories are dealt with. Most of them need to share private data across distinct organizations. In this paper, we propose a modification to an existing framework wherein data sharing across distributed databases is handled without compromising the sensitive nature of information. This paper focuses on replacing an inner join with semi-join reducer technique in one of the distributed sites of an existing query execution model. We will demonstrate how transmitting redundant data can be eliminated deploying a reducer technique which ultimately results in minimization of communication cost.
在处理大量数据存储库的行业中,数据隐私正日益受到关注。它们中的大多数需要在不同的组织之间共享私有数据。在本文中,我们提出了对现有框架的修改,其中跨分布式数据库处理数据共享而不损害信息的敏感性。本文主要研究在现有查询执行模型的分布式站点中,用半连接减速器技术代替内连接。我们将演示如何通过部署减速器技术来消除传输冗余数据,从而最终实现通信成本的最小化。
{"title":"Distributed query processing and data sharing","authors":"Ahana Roy, Aspen Olmsted","doi":"10.23919/ICITST.2017.8356387","DOIUrl":"https://doi.org/10.23919/ICITST.2017.8356387","url":null,"abstract":"Data privacy is becoming an increasing concern in industries where huge data repositories are dealt with. Most of them need to share private data across distinct organizations. In this paper, we propose a modification to an existing framework wherein data sharing across distributed databases is handled without compromising the sensitive nature of information. This paper focuses on replacing an inner join with semi-join reducer technique in one of the distributed sites of an existing query execution model. We will demonstrate how transmitting redundant data can be eliminated deploying a reducer technique which ultimately results in minimization of communication cost.","PeriodicalId":440665,"journal":{"name":"2017 12th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126908701","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Ethereum transaction graph analysis 以太坊交易图分析
Wren Chan, Aspen Olmsted
Cryptocurrency platforms such as Bitcoin and Ethereum have become more popular due to decentralized control and the promise of anonymity. Ethereum is particularly powerful due to its support for smart contracts which are implemented through Turing complete scripting languages and digital tokens that represent fungible tradable goods. It is necessary to understand whether de-anonymization is feasible to quantify the promise of anonymity. Cryptocurrencies are increasingly being used in online black markets like Silk Road and ransomware like CryptoLocker and WannaCry. In this paper, we propose a model for persisting transactions from Ethereum into a graph database, Neo4j. We propose leveraging graph compute or analytics against the transactions persisted into a graph database.
由于分散控制和匿名承诺,比特币和以太坊等加密货币平台变得越来越受欢迎。以太坊特别强大,因为它支持通过图灵完整脚本语言和代表可替代交易商品的数字令牌实现的智能合约。有必要了解去匿名化是否可行,以量化匿名的承诺。加密货币越来越多地被用于丝绸之路(Silk Road)等在线黑市,以及CryptoLocker和WannaCry等勒索软件。在本文中,我们提出了一个模型,用于将以太坊的交易持久化到图形数据库Neo4j中。我们建议利用图计算或分析来处理持久化到图数据库中的事务。
{"title":"Ethereum transaction graph analysis","authors":"Wren Chan, Aspen Olmsted","doi":"10.23919/ICITST.2017.8356459","DOIUrl":"https://doi.org/10.23919/ICITST.2017.8356459","url":null,"abstract":"Cryptocurrency platforms such as Bitcoin and Ethereum have become more popular due to decentralized control and the promise of anonymity. Ethereum is particularly powerful due to its support for smart contracts which are implemented through Turing complete scripting languages and digital tokens that represent fungible tradable goods. It is necessary to understand whether de-anonymization is feasible to quantify the promise of anonymity. Cryptocurrencies are increasingly being used in online black markets like Silk Road and ransomware like CryptoLocker and WannaCry. In this paper, we propose a model for persisting transactions from Ethereum into a graph database, Neo4j. We propose leveraging graph compute or analytics against the transactions persisted into a graph database.","PeriodicalId":440665,"journal":{"name":"2017 12th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115060083","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 53
A novel multimedia-forensic analysis tool (M-FAT) 一种新型多媒体取证分析工具(M-FAT)
Shahlaa Mashhadani, Hiba Al-kawaz, N. Clarke, S. Furnell, Fudong Li
Digital forensics has become a fundamental requirement for law enforcement due to the growing volume of cyber and computer-assisted crime. Whilst existing commercial tools have traditionally focused upon string-based analyses (e.g., regular expressions, keywords), less effort has been placed towards the development of multimedia-based analyses. Within the research community, more focus has been attributed to the analysis of multimedia content; they tend to focus upon highly specialised specific scenarios such as tattoo identification, number plate recognition, suspect face recognition and manual annotation of images. Given the ever-increasing volume of multimedia content, it is essential that a holistic Multimedia-Forensic Analysis Tool (M-FAT) is developed to extract, index, analyse the recovered images and provide an investigator with an environment with which to ask more abstract and cognitively challenging questions of the data. This paper proposes such a system, focusing upon a combination of object and facial recognition to provide a robust system. This system will enable investigators to perform a variety of forensic analyses that aid in reducing the time, effort and cognitive load being placed on the investigator to identify relevant evidence.
由于网络和计算机辅助犯罪的数量不断增加,数字取证已成为执法部门的一项基本要求。虽然现有的商业工具传统上专注于基于字符串的分析(例如,正则表达式,关键字),但很少致力于开发基于多媒体的分析。在研究界,更多的焦点被归于对多媒体内容的分析;他们往往专注于高度专业化的特定场景,如纹身识别、车牌识别、嫌疑人面部识别和手动注释图像。鉴于多媒体内容的数量不断增加,有必要开发一个整体的多媒体法医分析工具(M-FAT)来提取,索引,分析恢复的图像,并为调查人员提供一个环境,让他们提出更多抽象的和认知上具有挑战性的数据问题。本文提出了这样一个系统,重点是物体和面部识别的结合,以提供一个鲁棒的系统。该系统将使调查人员能够进行各种法医分析,有助于减少调查人员识别相关证据的时间、精力和认知负担。
{"title":"A novel multimedia-forensic analysis tool (M-FAT)","authors":"Shahlaa Mashhadani, Hiba Al-kawaz, N. Clarke, S. Furnell, Fudong Li","doi":"10.23919/ICITST.2017.8356429","DOIUrl":"https://doi.org/10.23919/ICITST.2017.8356429","url":null,"abstract":"Digital forensics has become a fundamental requirement for law enforcement due to the growing volume of cyber and computer-assisted crime. Whilst existing commercial tools have traditionally focused upon string-based analyses (e.g., regular expressions, keywords), less effort has been placed towards the development of multimedia-based analyses. Within the research community, more focus has been attributed to the analysis of multimedia content; they tend to focus upon highly specialised specific scenarios such as tattoo identification, number plate recognition, suspect face recognition and manual annotation of images. Given the ever-increasing volume of multimedia content, it is essential that a holistic Multimedia-Forensic Analysis Tool (M-FAT) is developed to extract, index, analyse the recovered images and provide an investigator with an environment with which to ask more abstract and cognitively challenging questions of the data. This paper proposes such a system, focusing upon a combination of object and facial recognition to provide a robust system. This system will enable investigators to perform a variety of forensic analyses that aid in reducing the time, effort and cognitive load being placed on the investigator to identify relevant evidence.","PeriodicalId":440665,"journal":{"name":"2017 12th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114895939","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Intelligent laboratory management system based on Internet of Things 基于物联网的智能实验室管理系统
Yichen Ma, Fuyao Wang, Zhuozheng Wang
For the purpose of optimizing laboratory management, a set of intelligent laboratory management system based on Internet of things is described in this paper. The hardware platform of this system is STM32 micro-controller, adopts WIFI intelligent power module, RFID-RC522 card reader, using Android/Java language to develop raspberry 3. When the students get to the laboratory and put their student cards on, the system would read the student information in the cloud database and find the student's course information, recorded in the STM32 micro-controller and display the information on the raspberry3. According to the information, the system would sign the data in the cloud database. Achieved an efficient laboratory intelligent information management system based on Internet of things.
为了优化实验室管理,本文介绍了一套基于物联网的智能实验室管理系统。本系统的硬件平台为STM32单片机,采用WIFI智能电源模块,RFID-RC522读卡器,采用Android/Java语言开发覆盆子3。当学生到达实验室,戴上学生证后,系统读取云数据库中的学生信息,查找学生的课程信息,记录在STM32微控制器上,并显示在raspberry3上。根据这些信息,系统将对云数据库中的数据进行签名。实现了基于物联网的高效实验室智能信息管理系统。
{"title":"Intelligent laboratory management system based on Internet of Things","authors":"Yichen Ma, Fuyao Wang, Zhuozheng Wang","doi":"10.23919/ICITST.2017.8356449","DOIUrl":"https://doi.org/10.23919/ICITST.2017.8356449","url":null,"abstract":"For the purpose of optimizing laboratory management, a set of intelligent laboratory management system based on Internet of things is described in this paper. The hardware platform of this system is STM32 micro-controller, adopts WIFI intelligent power module, RFID-RC522 card reader, using Android/Java language to develop raspberry 3. When the students get to the laboratory and put their student cards on, the system would read the student information in the cloud database and find the student's course information, recorded in the STM32 micro-controller and display the information on the raspberry3. According to the information, the system would sign the data in the cloud database. Achieved an efficient laboratory intelligent information management system based on Internet of things.","PeriodicalId":440665,"journal":{"name":"2017 12th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133255095","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Distributed computing framework in security: Case study of encryption method 安全中的分布式计算框架:加密方法的案例研究
Shuaiyi Bu, Shuxin Yang, Haoming Ji
Cloud computing has garnered increasing attention from researchers who have presented much work on performing massive computing tasks efficiently. Many security vulnerabilities have simultaneously occurred; therefore dealing with security problems in cloud computing has become an urgent issue. The purpose of this paper is to create a cloud computing framework based on the Map Reduce platform, a Google cloud-computing platform, and solve some security problems in the process of distributed computation. Inspired by SMC (Secure Multi-Party Computation), a protocol naturally suitable for distributed computation, we adopted homomorphic encryption, which could be used for processing a large amount of data securely in cloud computation. We also find that order preserving encryption(OPE), an encryption algorithm put forward in 2004, can be used in our secure framework. Cognizant of the applicability of SMC and OPE in cloud computing, we combine them with Map Reduce to design a security framework of distributed computation. Our major contributions consist of designing an innovative cloud computation framework in security based on Map Reduce, applying the order preserving encryption(OPE) algorithm, homomorphic encryption, and constructing a real distributed computation platform.
云计算已经引起了研究人员越来越多的关注,他们在高效地执行大量计算任务方面做了很多工作。许多安全漏洞同时发生;因此,处理云计算中的安全问题已成为一个迫切需要解决的问题。本文的目的是在Google云计算平台Map Reduce平台的基础上创建一个云计算框架,解决分布式计算过程中的一些安全问题。受SMC (Secure Multi-Party Computation,安全多方计算)这一天然适合分布式计算的协议的启发,我们采用了同态加密,可以在云计算中安全地处理大量数据。我们还发现2004年提出的保序加密算法(OPE)可以应用于我们的安全框架中。认识到SMC和OPE在云计算中的适用性,我们将它们与Map Reduce相结合,设计了一个分布式计算的安全框架。我们的主要贡献包括基于Map Reduce设计了一个创新的安全云计算框架,应用了保序加密(OPE)算法,同态加密,构建了一个真正的分布式计算平台。
{"title":"Distributed computing framework in security: Case study of encryption method","authors":"Shuaiyi Bu, Shuxin Yang, Haoming Ji","doi":"10.23919/ICITST.2017.8356407","DOIUrl":"https://doi.org/10.23919/ICITST.2017.8356407","url":null,"abstract":"Cloud computing has garnered increasing attention from researchers who have presented much work on performing massive computing tasks efficiently. Many security vulnerabilities have simultaneously occurred; therefore dealing with security problems in cloud computing has become an urgent issue. The purpose of this paper is to create a cloud computing framework based on the Map Reduce platform, a Google cloud-computing platform, and solve some security problems in the process of distributed computation. Inspired by SMC (Secure Multi-Party Computation), a protocol naturally suitable for distributed computation, we adopted homomorphic encryption, which could be used for processing a large amount of data securely in cloud computation. We also find that order preserving encryption(OPE), an encryption algorithm put forward in 2004, can be used in our secure framework. Cognizant of the applicability of SMC and OPE in cloud computing, we combine them with Map Reduce to design a security framework of distributed computation. Our major contributions consist of designing an innovative cloud computation framework in security based on Map Reduce, applying the order preserving encryption(OPE) algorithm, homomorphic encryption, and constructing a real distributed computation platform.","PeriodicalId":440665,"journal":{"name":"2017 12th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"212 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134429458","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2017 12th International Conference for Internet Technology and Secured Transactions (ICITST)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1