首页 > 最新文献

International Journal of Information and Computer Security最新文献

英文 中文
JPBlock: augmenting security of current journal and paper publication processes using blockchain and smart contract JPBlock:使用区块链和智能合约增强当前期刊和论文出版过程的安全性
Q3 Engineering Pub Date : 2023-01-01 DOI: 10.1504/ijics.2023.132733
J. Odoom, Xiaofang Huang, R. S. Soglo
{"title":"JPBlock: augmenting security of current journal and paper publication processes using blockchain and smart contract","authors":"J. Odoom, Xiaofang Huang, R. S. Soglo","doi":"10.1504/ijics.2023.132733","DOIUrl":"https://doi.org/10.1504/ijics.2023.132733","url":null,"abstract":"","PeriodicalId":53652,"journal":{"name":"International Journal of Information and Computer Security","volume":"21 1","pages":"262-292"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67039975","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A method of speech information hiding in inactive frame based on pitch modulation 一种基于基音调制的非活动帧语音信息隐藏方法
Q3 Engineering Pub Date : 2023-01-01 DOI: 10.1504/ijics.2023.133367
Zhijun Wu, Chenlei Zhang, Junjun Guo
To solve the problem that the speech information hiding algorithm based on random position selection and matrix coding has insufficient hiding capacity, the paper proposes a novel pitch modulation steganography method based on inactive frame. In this method, the least significant bit (LSB) replacement method is adopted for inactive frames, and the speech information hiding algorithm based on random position selection and matrix coding is adopted for active frames, which realises the pitch modulation information hiding method based on inactive frames. Finally, simulation experiments are carried out for the pitch modulation information hiding method based on inactive frames. The results indicate that the maximum hiding capacity of the algorithm in this paper can reach 241.67 bps, which significantly improves the hiding capacity, and at the same time the concealment has also been improved to a certain extent.
针对基于随机位置选择和矩阵编码的语音信息隐藏算法隐藏能力不足的问题,提出了一种基于非活动帧的基音调制隐写方法。该方法对非活动帧采用最低有效位(LSB)替换方法,对活动帧采用基于随机位置选择和矩阵编码的语音信息隐藏算法,实现了基于非活动帧的基音调制信息隐藏方法。最后,对基于非活动帧的基音调制信息隐藏方法进行了仿真实验。结果表明,本文算法的最大隐藏容量可达241.67 bps,显著提高了隐藏容量,同时隐蔽性也有一定程度的提高。
{"title":"A method of speech information hiding in inactive frame based on pitch modulation","authors":"Zhijun Wu, Chenlei Zhang, Junjun Guo","doi":"10.1504/ijics.2023.133367","DOIUrl":"https://doi.org/10.1504/ijics.2023.133367","url":null,"abstract":"To solve the problem that the speech information hiding algorithm based on random position selection and matrix coding has insufficient hiding capacity, the paper proposes a novel pitch modulation steganography method based on inactive frame. In this method, the least significant bit (LSB) replacement method is adopted for inactive frames, and the speech information hiding algorithm based on random position selection and matrix coding is adopted for active frames, which realises the pitch modulation information hiding method based on inactive frames. Finally, simulation experiments are carried out for the pitch modulation information hiding method based on inactive frames. The results indicate that the maximum hiding capacity of the algorithm in this paper can reach 241.67 bps, which significantly improves the hiding capacity, and at the same time the concealment has also been improved to a certain extent.","PeriodicalId":53652,"journal":{"name":"International Journal of Information and Computer Security","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135495530","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cryptanalysis of Common Prime RSA with Two Decryption Exponents: Jochemsz and May Approach 具有两个解密指数的公共素数RSA的密码分析:Jochemsz和May方法
Q3 Engineering Pub Date : 2023-01-01 DOI: 10.1504/ijics.2023.10051701
R. Kumar, S.Mithilesh Krishna
{"title":"Cryptanalysis of Common Prime RSA with Two Decryption Exponents: Jochemsz and May Approach","authors":"R. Kumar, S.Mithilesh Krishna","doi":"10.1504/ijics.2023.10051701","DOIUrl":"https://doi.org/10.1504/ijics.2023.10051701","url":null,"abstract":"","PeriodicalId":53652,"journal":{"name":"International Journal of Information and Computer Security","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67030678","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance evaluation of various deep convolutional neural network models through classification of malware 基于恶意软件分类的各种深度卷积神经网络模型的性能评估
Q3 Engineering Pub Date : 2023-01-01 DOI: 10.1504/ijics.2023.10052186
Samrat Kumar Dey, M. Rahman, Md Arman Hossain, Maria Afnan, Zareen Tasneem
{"title":"Performance evaluation of various deep convolutional neural network models through classification of malware","authors":"Samrat Kumar Dey, M. Rahman, Md Arman Hossain, Maria Afnan, Zareen Tasneem","doi":"10.1504/ijics.2023.10052186","DOIUrl":"https://doi.org/10.1504/ijics.2023.10052186","url":null,"abstract":"","PeriodicalId":53652,"journal":{"name":"International Journal of Information and Computer Security","volume":"21 1","pages":"414-435"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67030682","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
PBDG: A Malicious Code Detection Method Based on Precise Behavior Dependency Graph 基于精确行为依赖图的恶意代码检测方法
Q3 Engineering Pub Date : 2023-01-01 DOI: 10.1504/ijics.2023.10052187
Qi Gao, Mengmeng Yang, Chenghua Tang, Baohua Qiang
{"title":"PBDG: A Malicious Code Detection Method Based on Precise Behavior Dependency Graph","authors":"Qi Gao, Mengmeng Yang, Chenghua Tang, Baohua Qiang","doi":"10.1504/ijics.2023.10052187","DOIUrl":"https://doi.org/10.1504/ijics.2023.10052187","url":null,"abstract":"","PeriodicalId":53652,"journal":{"name":"International Journal of Information and Computer Security","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67030688","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A comprehensive survey on fuzzy-based intelligent intrusion detection system for internet of things 基于模糊的物联网智能入侵检测系统综述
Q3 Engineering Pub Date : 2023-01-01 DOI: 10.1504/ijics.2023.132724
U. Nandhini, Svn Santhosh Kumar
{"title":"A comprehensive survey on fuzzy-based intelligent intrusion detection system for internet of things","authors":"U. Nandhini, Svn Santhosh Kumar","doi":"10.1504/ijics.2023.132724","DOIUrl":"https://doi.org/10.1504/ijics.2023.132724","url":null,"abstract":"","PeriodicalId":53652,"journal":{"name":"International Journal of Information and Computer Security","volume":"21 1","pages":"383-398"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67039685","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Image Encryption Using Hybrid Grey Wolf Optimization and Chaotic Map 基于混合灰狼优化和混沌映射的图像加密
Q3 Engineering Pub Date : 2023-01-01 DOI: 10.1504/ijics.2023.10057701
Waleed Ameen Mahmoud Al Jawher, Ali Akram Abdul Kareem
{"title":"An Image Encryption Using Hybrid Grey Wolf Optimization and Chaotic Map","authors":"Waleed Ameen Mahmoud Al Jawher, Ali Akram Abdul Kareem","doi":"10.1504/ijics.2023.10057701","DOIUrl":"https://doi.org/10.1504/ijics.2023.10057701","url":null,"abstract":"","PeriodicalId":53652,"journal":{"name":"International Journal of Information and Computer Security","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67039908","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Searching the space of tower field implementations of the 𝔽<SUB align="right">2<SUP align="right">8</SUP> inverter - with applications to AES, Camellia and SM4 搜索塔场空间实现的𝔽&lt;SUB align="right"&gt;2&lt;SUP align="right"&gt;8&lt;/SUP&gt;变频器-适用于AES, Camellia和SM4
Q3 Engineering Pub Date : 2023-01-01 DOI: 10.1504/ijics.2023.127999
Zihao Wei, Siwei Sun, Lei Hu, Man Wei, René Peralta
No AccessSearching the space of tower field implementations of the 𝔽28 inverter - with applications to AES, Camellia and SM4Zihao Wei, Siwei Sun, Lei Hu, Man Wei and René PeraltaZihao WeiState Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing 100093, China; School of Cyber Security, University of Chinese Academy of Sciences, Beijing 100049, China, Siwei SunState Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing 100093, China; School of Cyber Security, University of Chinese Academy of Sciences, Beijing 100049, China, Lei HuState Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing 100093, China; School of Cyber Security, University of Chinese Academy of Sciences, Beijing 100049, China, Man WeiState Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing 100093, China; School of Cyber Security, University of Chinese Academy of Sciences, Beijing 100049, China and René PeraltaComputer Security Division, NIST, 100 Bureau Drive, Stop 8930, Gaithersburg, MD 20899-8930, USAPublished Online:December 21, 2022pp 1-26https://doi.org/10.1504/IJICS.2023.127999PDF ToolsAdd to FavouritesDownload CitationsTrack Citations Share this article on social mediaShareShare onFacebookTwitterLinkedInReddit AboutAbstractThe tower field implementation of the 𝔽28 inverter is not only the key technique for compact implementations of the S-boxes of several internationally standardised block ciphers such as AES, Camellia, and SM4, but also the underlying structure many side-channel attack resistant AES implementations rely on. In this work, we conduct an exhaustive study of the tower field representations of the 𝔽28 inverter with normal bases by applying several state-of-the-art combinatorial logic minimisation techniques. As a result, we achieve improved implementations of the AES, Camellia and SM4 S-boxes in terms of area footprint. Surprisingly, we are still able to improve the currently known most compact implementation of the AES S-box from CHES 2018 by 5.5 GE, beating the record again. For Camellia and SM4, the improvements are even more significant. The Verilog codes of our implementations of the AES, Camellia and SM4 S-boxes are openly available.Keywordstower field, inverter, S-box, AES, Camellia, SM4 Next article FiguresReferencesRelatedDetails Volume 20Issue 1-22023 ISSN: 1744-1765eISSN: 1744-1773 HistoryPublished onlineDecember 21, 2022 Copyright © 2023 Inderscience Enterprises Ltd.Keywordstower fieldinverterS-boxAESCamelliaSM4Authors and AffiliationsZihao Wei1 Siwei Sun2 Lei Hu3 Man Wei4 René Peralta5 1. State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing 100093, China; School of Cyber Security, University of Chinese Academy of Sciences, Beijing 1000
中国科学院信息工程研究所信息安全国家重点实验室,北京100093中国科学院信息工程研究所信息安全国家重点实验室,魏子豪,孙思伟,胡磊,魏曼,魏子豪中国科学院大学网络安全学院,北京100049;中国科学院信息工程研究所信息安全国家重点实验室,北京100093;中国科学院大学网络安全学院,北京100049;中国科学院信息工程研究所信息安全国家重点实验室,北京100093;中国科学院大学网络安全学院,北京100049;中国科学院信息工程研究所信息安全国家重点实验室,北京100093;中国科学院大学网络安全学院,北京100049;美国国家标准与技术研究院,美国马里兰州盖瑟斯堡8930站100局路计算机安全研究室,20899-8930@ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @𝔽28逆变器的塔场实现不仅是几个国际标准化分组密码(如AES, Camellia和SM4)的s盒紧凑实现的关键技术,也是许多抗侧信道攻击AES实现所依赖的底层结构。在这项工作中,我们通过应用几种最先进的组合逻辑最小化技术,对具有正常基的𝔽28逆变器的塔场表示进行了详尽的研究。因此,我们在面积占用方面实现了AES、Camellia和SM4 s -box的改进实现。令人惊讶的是,我们仍然能够将目前已知的最紧凑的AES S-box实现从CHES 2018提高5.5 GE,再次打破纪录。对于Camellia和SM4,改进甚至更显著。我们的AES、Camellia和SM4 s -box实现的Verilog代码是公开可用的。关键词发射场,逆变器,S-box, AES,山茶花,SM4下一篇文章图参考文献相关信息第20卷第1-22023期ISSN: 1744-1765eISSN: 1744-1773历史在线出版2022年12月21日版权所有©2023 Inderscience Enterprises ltd .关键词发射场逆变器- boxaescamelliasm4作者及单位魏子豪1孙思维2胡蕾3魏曼4 renve1peralta5中国科学院信息工程研究所信息安全国家重点实验室,北京100093;1 .中国科学院大学网络安全学院,北京100049中国科学院信息工程研究所信息安全国家重点实验室,北京100093;中国科学院大学网络安全学院,北京100049中国科学院信息工程研究所信息安全国家重点实验室,北京100093;3 .中国科学院大学网络安全学院,北京100049中国科学院信息工程研究所信息安全国家重点实验室,北京100093;中国科学院大学网络安全学院,北京100049NIST计算机安全部门,100 Bureau Drive, Stop 8930, Gaithersburg, MD, 20899-8930, USAPDF下载
{"title":"Searching the space of tower field implementations of the 𝔽&lt;SUB align=\"right\"&gt;2&lt;SUP align=\"right\"&gt;8&lt;/SUP&gt; inverter - with applications to AES, Camellia and SM4","authors":"Zihao Wei, Siwei Sun, Lei Hu, Man Wei, René Peralta","doi":"10.1504/ijics.2023.127999","DOIUrl":"https://doi.org/10.1504/ijics.2023.127999","url":null,"abstract":"No AccessSearching the space of tower field implementations of the 𝔽28 inverter - with applications to AES, Camellia and SM4Zihao Wei, Siwei Sun, Lei Hu, Man Wei and René PeraltaZihao WeiState Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing 100093, China; School of Cyber Security, University of Chinese Academy of Sciences, Beijing 100049, China, Siwei SunState Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing 100093, China; School of Cyber Security, University of Chinese Academy of Sciences, Beijing 100049, China, Lei HuState Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing 100093, China; School of Cyber Security, University of Chinese Academy of Sciences, Beijing 100049, China, Man WeiState Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing 100093, China; School of Cyber Security, University of Chinese Academy of Sciences, Beijing 100049, China and René PeraltaComputer Security Division, NIST, 100 Bureau Drive, Stop 8930, Gaithersburg, MD 20899-8930, USAPublished Online:December 21, 2022pp 1-26https://doi.org/10.1504/IJICS.2023.127999PDF ToolsAdd to FavouritesDownload CitationsTrack Citations Share this article on social mediaShareShare onFacebookTwitterLinkedInReddit AboutAbstractThe tower field implementation of the 𝔽28 inverter is not only the key technique for compact implementations of the S-boxes of several internationally standardised block ciphers such as AES, Camellia, and SM4, but also the underlying structure many side-channel attack resistant AES implementations rely on. In this work, we conduct an exhaustive study of the tower field representations of the 𝔽28 inverter with normal bases by applying several state-of-the-art combinatorial logic minimisation techniques. As a result, we achieve improved implementations of the AES, Camellia and SM4 S-boxes in terms of area footprint. Surprisingly, we are still able to improve the currently known most compact implementation of the AES S-box from CHES 2018 by 5.5 GE, beating the record again. For Camellia and SM4, the improvements are even more significant. The Verilog codes of our implementations of the AES, Camellia and SM4 S-boxes are openly available.Keywordstower field, inverter, S-box, AES, Camellia, SM4 Next article FiguresReferencesRelatedDetails Volume 20Issue 1-22023 ISSN: 1744-1765eISSN: 1744-1773 HistoryPublished onlineDecember 21, 2022 Copyright © 2023 Inderscience Enterprises Ltd.Keywordstower fieldinverterS-boxAESCamelliaSM4Authors and AffiliationsZihao Wei1 Siwei Sun2 Lei Hu3 Man Wei4 René Peralta5 1. State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing 100093, China; School of Cyber Security, University of Chinese Academy of Sciences, Beijing 1000","PeriodicalId":53652,"journal":{"name":"International Journal of Information and Computer Security","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134996520","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Ensemble Learning Algorithms with Feature Reduction Mechanism for Intrusion Detection System 基于特征约简机制的入侵检测系统集成学习算法
Q3 Engineering Pub Date : 2023-01-01 DOI: 10.1504/ijics.2023.10050595
M. P. Dutta, Subhasish Banerjee, Gulab Sah
{"title":"Ensemble Learning Algorithms with Feature Reduction Mechanism for Intrusion Detection System","authors":"M. P. Dutta, Subhasish Banerjee, Gulab Sah","doi":"10.1504/ijics.2023.10050595","DOIUrl":"https://doi.org/10.1504/ijics.2023.10050595","url":null,"abstract":"","PeriodicalId":53652,"journal":{"name":"International Journal of Information and Computer Security","volume":"366 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67030620","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
User Driven General Framework to Cap the Joins in Secure Group Communication 限制安全组通信连接的用户驱动通用框架
Q3 Engineering Pub Date : 2023-01-01 DOI: 10.1504/ijics.2023.10052719
Purushothama B. R, Payal Sharma
{"title":"User Driven General Framework to Cap the Joins in Secure Group Communication","authors":"Purushothama B. R, Payal Sharma","doi":"10.1504/ijics.2023.10052719","DOIUrl":"https://doi.org/10.1504/ijics.2023.10052719","url":null,"abstract":"","PeriodicalId":53652,"journal":{"name":"International Journal of Information and Computer Security","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67030724","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
International Journal of Information and Computer Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1