首页 > 最新文献

IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004最新文献

英文 中文
Automatic proof of strong secrecy for security protocols 安全协议的强保密性自动证明
Pub Date : 2004-05-09 DOI: 10.1109/SECPRI.2004.1301317
B. Blanchet
We present a new automatic technique for proving strong secrecy for security protocols. Strong secrecy means that an adversary cannot see any difference when the value of the secret changes. Our technique relies on an automatic translation of the protocol into Horn clauses, and a resolution algorithm on the clauses. It requires important extensions with respect to previous work for the proof of (standard) secrecy and authenticity. This technique can handle a wide range of cryptographic primitives, and yields proofs valid for an unbounded number of sessions and an unbounded message space; it is also flexible and efficient. We have proved its correctness, implemented it, and tested it on several examples of protocols including JFK by W. Aiello et al. (2002).
提出了一种新的自动证明安全协议强保密性的技术。强保密性意味着当秘密值发生变化时,对手看不到任何变化。我们的技术依赖于将协议自动翻译成Horn子句,以及对这些子句的解析算法。它需要对之前的工作进行重要的扩展,以证明(标准)保密性和真实性。该技术可以处理广泛的加密原语,并产生对无界会话数量和无界消息空间有效的证明;它也是灵活和高效的。我们已经证明了它的正确性,实现了它,并在几个协议的例子上测试了它,包括W. Aiello等人的JFK(2002)。
{"title":"Automatic proof of strong secrecy for security protocols","authors":"B. Blanchet","doi":"10.1109/SECPRI.2004.1301317","DOIUrl":"https://doi.org/10.1109/SECPRI.2004.1301317","url":null,"abstract":"We present a new automatic technique for proving strong secrecy for security protocols. Strong secrecy means that an adversary cannot see any difference when the value of the secret changes. Our technique relies on an automatic translation of the protocol into Horn clauses, and a resolution algorithm on the clauses. It requires important extensions with respect to previous work for the proof of (standard) secrecy and authenticity. This technique can handle a wide range of cryptographic primitives, and yields proofs valid for an unbounded number of sessions and an unbounded message space; it is also flexible and efficient. We have proved its correctness, implemented it, and tested it on several examples of protocols including JFK by W. Aiello et al. (2002).","PeriodicalId":447471,"journal":{"name":"IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123595557","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 183
Multicast authentication in fully adversarial networks 完全对抗网络中的组播认证
Pub Date : 2004-05-09 DOI: 10.1109/SECPRI.2004.1301327
Anna Lysyanskaya, R. Tamassia, Nikos Triandopoulos
We study a general version of the multicast authentication problem where the underlying network, controlled by an adversary, may drop chosen packets, rearrange the order of the packets in an arbitrary way, and inject new packets into the transmitted stream. Prior work on the problem has focused on less general models, where random, rather than adversarially-selected packets may be dropped and altered, or no additional packets may be injected into the stream. We describe an efficient and scalable authentication scheme that is based on a novel combination of error-correcting codes with standard cryptographic primitives. We prove the security of our scheme and analyze its performance in terms of the computational effort at the sender and receiver and the communication overhead. We also discuss specific design and implementation choices and compare our scheme with previously proposed approaches.
我们研究了一个通用版本的组播认证问题,其中底层网络在对手的控制下,可能会丢弃选定的数据包,以任意方式重新排列数据包的顺序,并将新数据包注入传输流。先前对该问题的研究主要集中在不太通用的模型上,在这些模型中,随机而不是对抗性选择的数据包可能被丢弃和改变,或者没有额外的数据包可能被注入流。我们描述了一种高效且可扩展的身份验证方案,该方案基于纠错码与标准密码原语的新组合。我们证明了我们的方案的安全性,并从发送方和接收方的计算工作量和通信开销方面分析了它的性能。我们还讨论了具体的设计和实现选择,并将我们的方案与先前提出的方法进行了比较。
{"title":"Multicast authentication in fully adversarial networks","authors":"Anna Lysyanskaya, R. Tamassia, Nikos Triandopoulos","doi":"10.1109/SECPRI.2004.1301327","DOIUrl":"https://doi.org/10.1109/SECPRI.2004.1301327","url":null,"abstract":"We study a general version of the multicast authentication problem where the underlying network, controlled by an adversary, may drop chosen packets, rearrange the order of the packets in an arbitrary way, and inject new packets into the transmitted stream. Prior work on the problem has focused on less general models, where random, rather than adversarially-selected packets may be dropped and altered, or no additional packets may be injected into the stream. We describe an efficient and scalable authentication scheme that is based on a novel combination of error-correcting codes with standard cryptographic primitives. We prove the security of our scheme and analyze its performance in terms of the computational effort at the sender and receiver and the communication overhead. We also discuss specific design and implementation choices and compare our scheme with previously proposed approaches.","PeriodicalId":447471,"journal":{"name":"IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004","volume":"25 8","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132968328","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 86
Access control by tracking shallow execution history 通过跟踪浅层执行历史进行访问控制
Pub Date : 2004-05-09 DOI: 10.1109/SECPRI.2004.1301314
Philip W. L. Fong
Software execution environments like operating systems, mobile code platforms and scriptable applications must protect themselves against potential damages caused by malicious code. Monitoring the execution history of the latter provides an effective means for controlling the access pattern of system services. Several authors have recently proposed increasingly general automata models for characterizing various classes of security policies enforceable by execution monitoring. An open question raised by Bauer, Ligatti and Walker is whether one can further classify the space of security policies by constraining the capabilities of the execution monitor. This paper presents a novel information-based approach to address the research problem. Specifically, security policies are characterized by the information consumed by an enforcing execution monitor. By restricting the execution monitor to track only a shallow history of previously granted access events, a precise characterization of a class of security policies enforceable by restricted access to information is identified. Although provably less expressive than the general class of policies enforceable by execution monitoring, this class does contain naturally occurring policies including Chinese Wall policy, low-water-mark policy, one-out-of-k authorization, assured pipelines, etc. Encouraged by this success, the technique is generalized to produce a lattice of policy classes. Within the lattice, policy classes are ordered by the information required for enforcing member policies. Such a fine-grained policy classification lays the semantic foundation for future studies on special-purpose policy languages.
软件执行环境,如操作系统、移动代码平台和可脚本化应用程序,必须保护自己免受恶意代码造成的潜在损害。监视后者的执行历史为控制系统服务的访问模式提供了一种有效的方法。几位作者最近提出了越来越通用的自动机模型,用于描述通过执行监视可执行的各种安全策略的特征。Bauer、Ligatti和Walker提出的一个开放性问题是,是否可以通过限制执行监视器的功能来进一步对安全策略空间进行分类。本文提出了一种新的基于信息的方法来解决这一研究问题。具体地说,安全策略是由强制执行监控器所使用的信息来表征的。通过将执行监控器限制为仅跟踪先前授予的访问事件的浅层历史记录,可以确定通过限制对信息的访问来强制执行的一类安全策略的精确特征。尽管可以证明,与通过执行监视强制执行的一般策略类相比,它的表达能力较差,但该类确实包含自然发生的策略,包括Chinese Wall策略、低水位策略、1 -out- k授权、有保证的管道等。受到这一成功的鼓舞,该技术被推广到生成策略类的格。在点阵中,策略类按照执行成员策略所需的信息排序。这种细粒度的策略分类为今后专用策略语言的研究奠定了语义基础。
{"title":"Access control by tracking shallow execution history","authors":"Philip W. L. Fong","doi":"10.1109/SECPRI.2004.1301314","DOIUrl":"https://doi.org/10.1109/SECPRI.2004.1301314","url":null,"abstract":"Software execution environments like operating systems, mobile code platforms and scriptable applications must protect themselves against potential damages caused by malicious code. Monitoring the execution history of the latter provides an effective means for controlling the access pattern of system services. Several authors have recently proposed increasingly general automata models for characterizing various classes of security policies enforceable by execution monitoring. An open question raised by Bauer, Ligatti and Walker is whether one can further classify the space of security policies by constraining the capabilities of the execution monitor. This paper presents a novel information-based approach to address the research problem. Specifically, security policies are characterized by the information consumed by an enforcing execution monitor. By restricting the execution monitor to track only a shallow history of previously granted access events, a precise characterization of a class of security policies enforceable by restricted access to information is identified. Although provably less expressive than the general class of policies enforceable by execution monitoring, this class does contain naturally occurring policies including Chinese Wall policy, low-water-mark policy, one-out-of-k authorization, assured pipelines, etc. Encouraged by this success, the technique is generalized to produce a lattice of policy classes. Within the lattice, policy classes are ordered by the information required for enforcing member policies. Such a fine-grained policy classification lays the semantic foundation for future studies on special-purpose policy languages.","PeriodicalId":447471,"journal":{"name":"IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131329806","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 147
Symmetric encryption in automatic analyses for confidentiality against active adversaries 针对主动对手的机密性自动分析中的对称加密
Pub Date : 2004-05-09 DOI: 10.1109/SECPRI.2004.1301316
Peeter Laud
In this article we present a technique for static analysis, correct with respect to complexity-theoretic definitions of security, of cryptographic protocols for checking whether these protocols satisfy confidentiality properties. The approach is similar to Abadi and Rogaway - we define patterns for cryptographic protocols (they did it for formal expressions), such that the protocol is secure iff the patterns are. We then statically analyse the patterns, they should be easier to analyse than the protocols themselves. We consider symmetric encryption as the cryptographic primitive in protocols. Handling this primitive has so far received comparatively less attention in approaches striving to unite the formal and computational models of cryptography.
在本文中,我们提出了一种静态分析技术,正确地考虑了安全性的复杂性理论定义,用于检查这些协议是否满足机密性。这种方法类似于Abadi和Rogaway——我们为加密协议定义模式(他们为形式表达式定义模式),这样,如果模式是安全的,协议就是安全的。然后我们静态地分析模式,它们应该比协议本身更容易分析。我们把对称加密作为协议中的密码原语。到目前为止,在努力统一密码学的形式模型和计算模型的方法中,处理这个原语受到的关注相对较少。
{"title":"Symmetric encryption in automatic analyses for confidentiality against active adversaries","authors":"Peeter Laud","doi":"10.1109/SECPRI.2004.1301316","DOIUrl":"https://doi.org/10.1109/SECPRI.2004.1301316","url":null,"abstract":"In this article we present a technique for static analysis, correct with respect to complexity-theoretic definitions of security, of cryptographic protocols for checking whether these protocols satisfy confidentiality properties. The approach is similar to Abadi and Rogaway - we define patterns for cryptographic protocols (they did it for formal expressions), such that the protocol is secure iff the patterns are. We then statically analyse the patterns, they should be easier to analyse than the protocols themselves. We consider symmetric encryption as the cryptographic primitive in protocols. Handling this primitive has so far received comparatively less attention in approaches striving to unite the formal and computational models of cryptography.","PeriodicalId":447471,"journal":{"name":"IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133120730","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 104
Run-time principals in information-flow type systems 信息流类型系统中的运行时主体
Pub Date : 2004-05-09 DOI: 10.1145/1290520.1290526
Stephen Tse, S. Zdancewic
Information-flow type systems are a promising approach for enforcing strong end-to-end confidentiality and integrity policies. Such policies, however, are usually specified in term of static information-data is labeled high or low security at compile time. In practice, the confidentiality of data may depend on information available only while the system is running. This paper studies language support for run-time principals, a mechanism for specifying information-flow security policies that depend on which principals interact with the system. We establish the basic property of noninterference for programs written in such language, and use run-time principals for specifying run-time authority in downgrading mechanisms such as declassification. In addition to allowing more expressive security policies, run-time principals enable the integration of language-based security mechanisms with other existing approaches such as Java stack inspection and public key infrastructures. We sketch an implementation of run-time principals via public keys such that principal delegation is verified by certificate chains.
信息流类型系统是执行强大的端到端机密性和完整性策略的一种很有前途的方法。然而,这些策略通常是根据静态信息来指定的——数据在编译时被标记为高安全性或低安全性。在实践中,数据的机密性可能取决于仅在系统运行时可用的信息。本文研究了对运行时主体的语言支持,运行时主体是一种指定信息流安全策略的机制,该策略依赖于哪些主体与系统交互。我们为用这种语言编写的程序建立了不干扰的基本属性,并使用运行时原则来指定降级机制(如解密)中的运行时权限。除了允许更具表现力的安全策略之外,运行时主体还支持将基于语言的安全机制与其他现有方法(如Java堆栈检查和公钥基础设施)集成。我们通过公钥勾画了运行时主体的实现,这样主体委托就可以通过证书链进行验证。
{"title":"Run-time principals in information-flow type systems","authors":"Stephen Tse, S. Zdancewic","doi":"10.1145/1290520.1290526","DOIUrl":"https://doi.org/10.1145/1290520.1290526","url":null,"abstract":"Information-flow type systems are a promising approach for enforcing strong end-to-end confidentiality and integrity policies. Such policies, however, are usually specified in term of static information-data is labeled high or low security at compile time. In practice, the confidentiality of data may depend on information available only while the system is running. This paper studies language support for run-time principals, a mechanism for specifying information-flow security policies that depend on which principals interact with the system. We establish the basic property of noninterference for programs written in such language, and use run-time principals for specifying run-time authority in downgrading mechanisms such as declassification. In addition to allowing more expressive security policies, run-time principals enable the integration of language-based security mechanisms with other existing approaches such as Java stack inspection and public key infrastructures. We sketch an implementation of run-time principals via public keys such that principal delegation is verified by certificate chains.","PeriodicalId":447471,"journal":{"name":"IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117074543","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 102
Keyboard acoustic emanations 键盘声发射
Pub Date : 2004-05-09 DOI: 10.1109/SECPRI.2004.1301311
D. Asonov, R. Agrawal
We show that PC keyboards, notebook keyboards, telephone and ATM pads are vulnerable to attacks based on differentiating the sound emanated by different keys. Our attack employs a neural network to recognize the key being pressed. We also investigate why different keys produce different sounds and provide hints for the design of homophonic keyboards that would be resistant to this type of attack.
我们表明,基于区分不同按键发出的声音,PC键盘、笔记本键盘、电话和ATM键盘容易受到攻击。我们的攻击使用神经网络来识别被按下的键。我们还研究了为什么不同的键产生不同的声音,并为设计能抵抗这种攻击的同音键盘提供提示。
{"title":"Keyboard acoustic emanations","authors":"D. Asonov, R. Agrawal","doi":"10.1109/SECPRI.2004.1301311","DOIUrl":"https://doi.org/10.1109/SECPRI.2004.1301311","url":null,"abstract":"We show that PC keyboards, notebook keyboards, telephone and ATM pads are vulnerable to attacks based on differentiating the sound emanated by different keys. Our attack employs a neural network to recognize the key being pressed. We also investigate why different keys produce different sounds and provide hints for the design of homophonic keyboards that would be resistant to this type of attack.","PeriodicalId":447471,"journal":{"name":"IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133767873","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 322
On-the-fly verification of rateless erasure codes for efficient content distribution 无速率擦除码的动态验证,以实现高效的内容分发
Pub Date : 2004-05-09 DOI: 10.1109/SECPRI.2004.1301326
M. Krohn, M. Freedman, David Mazières
The quality of peer-to-peer content distribution can suffer when malicious participants intentionally corrupt content. Some systems using simple block-by-block downloading can verify blocks with traditional cryptographic signatures and hashes, but these techniques do not apply well to more elegant systems that use rateless erasure codes for efficient multicast transfers. This paper presents a practical scheme, based on homomorphic hashing, that enables a downloader to perform on-the-fly verification of erasure-encoded blocks.
当恶意参与者故意破坏内容时,点对点内容分发的质量可能会受到影响。一些使用简单逐块下载的系统可以用传统的加密签名和散列验证块,但是这些技术不适用于使用无速率擦除码进行高效多播传输的更优雅的系统。本文提出了一种基于同态哈希的实用方案,该方案使下载程序能够对擦除编码的块进行实时验证。
{"title":"On-the-fly verification of rateless erasure codes for efficient content distribution","authors":"M. Krohn, M. Freedman, David Mazières","doi":"10.1109/SECPRI.2004.1301326","DOIUrl":"https://doi.org/10.1109/SECPRI.2004.1301326","url":null,"abstract":"The quality of peer-to-peer content distribution can suffer when malicious participants intentionally corrupt content. Some systems using simple block-by-block downloading can verify blocks with traditional cryptographic signatures and hashes, but these techniques do not apply well to more elegant systems that use rateless erasure codes for efficient multicast transfers. This paper presents a practical scheme, based on homomorphic hashing, that enables a downloader to perform on-the-fly verification of erasure-encoded blocks.","PeriodicalId":447471,"journal":{"name":"IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127651522","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 408
SWATT: softWare-based attestation for embedded devices 嵌入式设备基于软件的认证
Pub Date : 2004-05-09 DOI: 10.1109/SECPRI.2004.1301329
Arvind Seshadri, A. Perrig, L. V. Doorn, P. Khosla
We expect a future where we are surrounded by embedded devices, ranging from Java-enabled cell phones to sensor networks and smart appliances. An adversary can compromise our privacy and safety by maliciously modifying the memory contents of these embedded devices. In this paper, we propose a softWare-based attestation technique (SWATT) to verify the memory contents of embedded devices and establish the absence of malicious changes to the memory contents. SWATT does not need physical access to the device's memory, yet provides memory content attestation similar to TCG or NGSCB without requiring secure hardware. SWATT can detect any change in memory contents with high probability, thus detecting viruses, unexpected configuration settings, and Trojan Horses. To circumvent SWATT, we expect that an attacker needs to change the hardware to hide memory content changes. We present an implementation of SWATT in off-the-shelf sensor network devices, which enables us to verify the contents of the program memory even while the sensor node is running.
我们期待着一个被嵌入式设备包围的未来,从支持java的手机到传感器网络和智能设备。攻击者可以通过恶意修改这些嵌入式设备的内存内容来损害我们的隐私和安全。在本文中,我们提出了一种基于软件的认证技术(SWATT)来验证嵌入式设备的内存内容,并确定内存内容不存在恶意更改。SWATT不需要物理访问设备的内存,但提供类似TCG或NGSCB的内存内容认证,而不需要安全的硬件。SWATT可以高概率地检测内存内容的任何变化,从而检测病毒、意外配置设置和特洛伊木马。为了规避SWATT,我们预计攻击者需要更改硬件以隐藏内存内容的更改。我们在现成的传感器网络设备中实现了SWATT,这使我们能够在传感器节点运行时验证程序内存的内容。
{"title":"SWATT: softWare-based attestation for embedded devices","authors":"Arvind Seshadri, A. Perrig, L. V. Doorn, P. Khosla","doi":"10.1109/SECPRI.2004.1301329","DOIUrl":"https://doi.org/10.1109/SECPRI.2004.1301329","url":null,"abstract":"We expect a future where we are surrounded by embedded devices, ranging from Java-enabled cell phones to sensor networks and smart appliances. An adversary can compromise our privacy and safety by maliciously modifying the memory contents of these embedded devices. In this paper, we propose a softWare-based attestation technique (SWATT) to verify the memory contents of embedded devices and establish the absence of malicious changes to the memory contents. SWATT does not need physical access to the device's memory, yet provides memory content attestation similar to TCG or NGSCB without requiring secure hardware. SWATT can detect any change in memory contents with high probability, thus detecting viruses, unexpected configuration settings, and Trojan Horses. To circumvent SWATT, we expect that an attacker needs to change the hardware to hide memory content changes. We present an implementation of SWATT in off-the-shelf sensor network devices, which enables us to verify the contents of the program memory even while the sensor node is running.","PeriodicalId":447471,"journal":{"name":"IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128090136","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 741
期刊
IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1