首页 > 最新文献

International journal of bio-medical computing最新文献

英文 中文
Managing secure computer systems and networks 管理安全的计算机系统和网络
Pub Date : 1996-10-01 DOI: 10.1016/S0020-7101(96)01226-3
Basic Von Solms

No computer system or computer network can today be operated without the necessary security measures to secure and protect the electronic assets stored, processed and transmitted using such systems and networks. Very often the effort in managing such security and protection measures are totally underestimated. This paper provides an overview of the security management needed to secure and protect a typical IT system and network. Special reference is made to this management effort in healthcare systems, and the role of the information security officer is also highlighted.

今天,如果没有必要的安全措施来保护使用这些系统和网络存储、处理和传输的电子资产,任何计算机系统或计算机网络都无法运行。管理这种安全和保护措施的努力往往被完全低估了。本文概述了保护典型IT系统和网络所需的安全管理。特别提到了医疗保健系统中的这种管理工作,并强调了信息安全官员的作用。
{"title":"Managing secure computer systems and networks","authors":"Basic Von Solms","doi":"10.1016/S0020-7101(96)01226-3","DOIUrl":"10.1016/S0020-7101(96)01226-3","url":null,"abstract":"<div><p>No computer system or computer network can today be operated without the necessary security measures to secure and protect the electronic assets stored, processed and transmitted using such systems and networks. Very often the effort in managing such security and protection measures are totally underestimated. This paper provides an overview of the security management needed to secure and protect a typical IT system and network. Special reference is made to this management effort in healthcare systems, and the role of the information security officer is also highlighted.</p></div>","PeriodicalId":75935,"journal":{"name":"International journal of bio-medical computing","volume":"43 1","pages":"Pages 47-52"},"PeriodicalIF":0.0,"publicationDate":"1996-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S0020-7101(96)01226-3","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"19923457","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Privacy and security issues in a wide area health communications network 广域卫生通信网络中的隐私和安全问题
Pub Date : 1996-10-01 DOI: 10.1016/S0020-7101(96)01237-8
Roderick Neame

In 1993 the first national health information service went live in New Zealand, using commercial network services for all communications. This system provides a point of connection for all health personnel, and for those with a legitimate interest in health care information (e.g. insurers): it also provides access to a number of information resources managed on behalf of the government of New Zealand (e.g. index of health care users), as well as to those developed by individual network service providers. Much of the data exchanged across this network is personalised. Since the recipient may not be known personally to the sender, it is vital that the sender has confidence that the recipient will treat personal information according to agreed criteria for privacy. A Code of Practice covering health information was developed under the New Zealand Privacy Act to ensure that the confidence to share confidential data was supported. For large organisations such as hospitals to function efficiently, they need the flexibility to be able quickly to assign user privileges to selected staff without the need for extra paperwork seeking approval from the centre. But the audit trail requires unique identification of the individual undertaking each transaction. This requirement has been addressed. Some of the data moved across the network relates to life-critical issues, e.g. clinical warnings about allergies or serious medical conditions. A failure of communications causing this vital information to be improperly represented in some way on the receivers system could have disastrous consequences. To ensure the integrity of data transfers, user installations have to be certified compliant with standard test scripts before they are authorised for access to these resources.

1993年,新西兰第一个国家卫生信息服务上线,使用商业网络服务进行所有通信。该系统为所有卫生人员和对卫生保健信息有合法利益的人(例如保险公司)提供了一个连接点:它还提供了访问代表新西兰政府管理的一些信息资源(例如卫生保健用户索引)以及访问由个别网络服务提供者开发的信息资源的途径。通过该网络交换的大部分数据都是个性化的。由于寄件人可能不认识收信人,因此寄件人有信心收信人会按照商定的隐私标准处理个人信息,这一点至关重要。根据《新西兰隐私法》制定了一项涉及健康信息的行为守则,以确保支持分享机密数据的信心。对于医院等大型组织来说,要想高效运作,它们需要灵活性,以便能够快速将用户权限分配给选定的员工,而无需额外的文书工作来寻求中心的批准。但是审计跟踪需要对每笔交易的个人进行唯一的标识。这一要求已得到解决。通过网络传输的一些数据与生命攸关的问题有关,例如关于过敏或严重医疗状况的临床警告。通信故障导致这些重要信息在接收系统上以某种方式不正确地表示,可能会产生灾难性的后果。为了确保数据传输的完整性,在授权用户访问这些资源之前,必须对用户安装进行符合标准测试脚本的认证。
{"title":"Privacy and security issues in a wide area health communications network","authors":"Roderick Neame","doi":"10.1016/S0020-7101(96)01237-8","DOIUrl":"10.1016/S0020-7101(96)01237-8","url":null,"abstract":"<div><p>In 1993 the first national health information service went live in New Zealand, using commercial network services for all communications. This system provides a point of connection for all health personnel, and for those with a legitimate interest in health care information (e.g. insurers): it also provides access to a number of information resources managed on behalf of the government of New Zealand (e.g. index of health care users), as well as to those developed by individual network service providers. Much of the data exchanged across this network is personalised. Since the recipient may not be known personally to the sender, it is vital that the sender has confidence that the recipient will treat personal information according to agreed criteria for privacy. A Code of Practice covering health information was developed under the New Zealand Privacy Act to ensure that the confidence to share confidential data was supported. For large organisations such as hospitals to function efficiently, they need the flexibility to be able quickly to assign user privileges to selected staff without the need for extra paperwork seeking approval from the centre. But the audit trail requires unique identification of the individual undertaking each transaction. This requirement has been addressed. Some of the data moved across the network relates to life-critical issues, e.g. clinical warnings about allergies or serious medical conditions. A failure of communications causing this vital information to be improperly represented in some way on the receivers system could have disastrous consequences. To ensure the integrity of data transfers, user installations have to be certified compliant with standard test scripts before they are authorised for access to these resources.</p></div>","PeriodicalId":75935,"journal":{"name":"International journal of bio-medical computing","volume":"43 1","pages":"Pages 123-127"},"PeriodicalIF":0.0,"publicationDate":"1996-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S0020-7101(96)01237-8","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"19923420","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Control and use of health information: a doctor's perspective 健康信息的控制和使用:医生的观点
Pub Date : 1996-10-01 DOI: 10.1016/S0020-7101(96)01222-6
Francis H. Roger France

The electronic health record offers all advantages of computer based memories. It is accessible over networks, highly structured and allows exchange of information both within the institution and across its borders. However, it has potential disadvantages among which a great risk for confidentiality, integrity and availability of information about identifiable patients exists. The present paper discusses advantages and disadvantages of the electronic health record as well as methods in order to control and use appropriately identifiable patient data. Personal data protection requires a legislation, a code of conduct, information contracts, an organisation under the responsibility of a physician, technical tools for health security, risk analysis methods, standards for development and implementation of computer systems as well as training and teaching sessions.

电子健康记录提供了基于计算机存储器的所有优点。它可以通过网络访问,高度结构化,并允许在机构内部和跨国界交换信息。然而,它也有潜在的缺点,其中存在关于可识别患者的信息的保密性,完整性和可用性的巨大风险。本文讨论了电子健康记录的优点和缺点,以及控制和使用适当可识别患者数据的方法。个人数据保护需要立法、行为准则、信息合同、由医生负责的组织、健康安全的技术工具、风险分析方法、开发和实施计算机系统的标准以及培训和教学课程。
{"title":"Control and use of health information: a doctor's perspective","authors":"Francis H. Roger France","doi":"10.1016/S0020-7101(96)01222-6","DOIUrl":"10.1016/S0020-7101(96)01222-6","url":null,"abstract":"<div><p>The electronic health record offers all advantages of computer based memories. It is accessible over networks, highly structured and allows exchange of information both within the institution and across its borders. However, it has potential disadvantages among which a great risk for confidentiality, integrity and availability of information about identifiable patients exists. The present paper discusses advantages and disadvantages of the electronic health record as well as methods in order to control and use appropriately identifiable patient data. Personal data protection requires a legislation, a code of conduct, information contracts, an organisation under the responsibility of a physician, technical tools for health security, risk analysis methods, standards for development and implementation of computer systems as well as training and teaching sessions.</p></div>","PeriodicalId":75935,"journal":{"name":"International journal of bio-medical computing","volume":"43 1","pages":"Pages 19-25"},"PeriodicalIF":0.0,"publicationDate":"1996-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S0020-7101(96)01222-6","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"19923453","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Secure medical databases: design and operation 安全的医疗数据库:设计和操作
Pub Date : 1996-10-01 DOI: 10.1016/S0020-7101(96)01227-5
Georges J. Pangalos

Medical database security plays an important role in the overall security of medical information systems. The development of appropriate secure database design and operation methodologies is an important problem in the area and a necessary prerequisite for the successful development of such systems. The general framework for medical database security and a number of parameters of the secure medical database design and operation problem are presented and discussed. A secure medical database development methodology is also presented which could help overcome some of the problems currently encountered.

医疗数据库安全是医疗信息系统整体安全的重要组成部分。开发适当的安全数据库设计和操作方法是该领域的一个重要问题,也是成功开发此类系统的必要前提。提出并讨论了医疗数据库安全的总体框架以及安全医疗数据库的若干参数设计和运行问题。还提出了一种安全的医学数据库开发方法,可以帮助克服目前遇到的一些问题。
{"title":"Secure medical databases: design and operation","authors":"Georges J. Pangalos","doi":"10.1016/S0020-7101(96)01227-5","DOIUrl":"10.1016/S0020-7101(96)01227-5","url":null,"abstract":"<div><p>Medical database security plays an important role in the overall security of medical information systems. The development of appropriate secure database design and operation methodologies is an important problem in the area and a necessary prerequisite for the successful development of such systems. The general framework for medical database security and a number of parameters of the secure medical database design and operation problem are presented and discussed. A secure medical database development methodology is also presented which could help overcome some of the problems currently encountered.</p></div>","PeriodicalId":75935,"journal":{"name":"International journal of bio-medical computing","volume":"43 1","pages":"Pages 53-60"},"PeriodicalIF":0.0,"publicationDate":"1996-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S0020-7101(96)01227-5","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"19923458","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Teaching secure communication: a challenge for nurse educators 安全沟通教学:护士教育工作者面临的挑战
Pub Date : 1996-10-01 DOI: 10.1016/S0020-7101(96)01234-2
Marianne Tallberg

The purpose of the paper was to find and discuss methods for teaching secure communication. A survey to a sample of nursing schools was executed. The teachers were asked to define ‘secure communication’ and to relate teaching methods used. Theories supporting the proposed methods were discussed. Conclusively it was found that a joint task force including IMIA WG4 and the IMIA and EFMI nursing groups for selecting an educational strategy in teaching ‘secure communication’ is highly recommended.

本文的目的是寻找和探讨安全通信教学的方法。对一些护理学校进行了抽样调查。老师们被要求定义“安全通信”,并使用相关的教学方法。讨论了支持所提方法的理论。最后,我们强烈建议成立一个联合工作组,包括IMIA WG4和IMIA和EFMI护理小组,以选择教学“安全通信”的教育策略。
{"title":"Teaching secure communication: a challenge for nurse educators","authors":"Marianne Tallberg","doi":"10.1016/S0020-7101(96)01234-2","DOIUrl":"10.1016/S0020-7101(96)01234-2","url":null,"abstract":"<div><p>The purpose of the paper was to find and discuss methods for teaching secure communication. A survey to a sample of nursing schools was executed. The teachers were asked to define ‘secure communication’ and to relate teaching methods used. Theories supporting the proposed methods were discussed. Conclusively it was found that a joint task force including IMIA WG4 and the IMIA and EFMI nursing groups for selecting an educational strategy in teaching ‘secure communication’ is highly recommended.</p></div>","PeriodicalId":75935,"journal":{"name":"International journal of bio-medical computing","volume":"43 1","pages":"Pages 101-104"},"PeriodicalIF":0.0,"publicationDate":"1996-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S0020-7101(96)01234-2","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"19923417","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Legal aspects of safe communication 安全通信的法律方面
Pub Date : 1996-10-01 DOI: 10.1016/S0020-7101(96)01229-9
Jorma Kuopus

The legal position of confidentiality and the safe transmission of medical information is examined in the context of the EU Directive and the technical mechanisms available for addressing these problems.

在欧盟指令和解决这些问题的现有技术机制的背景下,审查了保密和安全传输医疗信息的法律地位。
{"title":"Legal aspects of safe communication","authors":"Jorma Kuopus","doi":"10.1016/S0020-7101(96)01229-9","DOIUrl":"10.1016/S0020-7101(96)01229-9","url":null,"abstract":"<div><p>The legal position of confidentiality and the safe transmission of medical information is examined in the context of the EU Directive and the technical mechanisms available for addressing these problems.</p></div>","PeriodicalId":75935,"journal":{"name":"International journal of bio-medical computing","volume":"43 1","pages":"Pages 69-74"},"PeriodicalIF":0.0,"publicationDate":"1996-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S0020-7101(96)01229-9","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"19923460","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Network projects in the North Karelian Hospital District 北卡累利阿医院区的网络项目
Pub Date : 1996-10-01 DOI: 10.1016/S0020-7101(96)01240-8
Pentti Itkonen
{"title":"Network projects in the North Karelian Hospital District","authors":"Pentti Itkonen","doi":"10.1016/S0020-7101(96)01240-8","DOIUrl":"10.1016/S0020-7101(96)01240-8","url":null,"abstract":"","PeriodicalId":75935,"journal":{"name":"International journal of bio-medical computing","volume":"43 1","pages":"Pages 143-146"},"PeriodicalIF":0.0,"publicationDate":"1996-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S0020-7101(96)01240-8","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"19923423","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Overall observations, conclusions and recommendations 总体观察、结论和建议
Pub Date : 1996-10-01 DOI: 10.1016/S0020-7101(96)01241-X
Albert R. Bakker , Barry Barber , Raija Tervo Pellikka
{"title":"Overall observations, conclusions and recommendations","authors":"Albert R. Bakker ,&nbsp;Barry Barber ,&nbsp;Raija Tervo Pellikka","doi":"10.1016/S0020-7101(96)01241-X","DOIUrl":"10.1016/S0020-7101(96)01241-X","url":null,"abstract":"","PeriodicalId":75935,"journal":{"name":"International journal of bio-medical computing","volume":"43 1","pages":"Pages 149-152"},"PeriodicalIF":0.0,"publicationDate":"1996-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S0020-7101(96)01241-X","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"19923424","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Developments in health care, the increasing role of information technology: security issues 医疗保健的发展,信息技术日益重要的作用:安全问题
Pub Date : 1996-10-01 DOI: 10.1016/S0020-7101(96)01221-4
Seppo Immonen

Information security is a must in health care as is commonly know. This paper describes the conflict between the strategic goals of an organisation and organising information security and confidentiality. Because of local strategies and the organisational effect on the need for information, it is necessary to describe the main features of the Finnish Health care system and Helsinki City Health Department.

众所周知,在医疗保健领域,信息安全是必须的。本文描述了组织的战略目标与组织信息安全和机密性之间的冲突。由于地方战略和组织对信息需求的影响,有必要描述芬兰卫生保健系统和赫尔辛基市卫生部门的主要特点。
{"title":"Developments in health care, the increasing role of information technology: security issues","authors":"Seppo Immonen","doi":"10.1016/S0020-7101(96)01221-4","DOIUrl":"10.1016/S0020-7101(96)01221-4","url":null,"abstract":"<div><p>Information security is a must in health care as is commonly know. This paper describes the conflict between the strategic goals of an organisation and organising information security and confidentiality. Because of local strategies and the organisational effect on the need for information, it is necessary to describe the main features of the Finnish Health care system and Helsinki City Health Department.</p></div>","PeriodicalId":75935,"journal":{"name":"International journal of bio-medical computing","volume":"43 1","pages":"Pages 9-15"},"PeriodicalIF":0.0,"publicationDate":"1996-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S0020-7101(96)01221-4","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"19923452","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Technical means for securing health information 确保健康信息安全的技术手段
Pub Date : 1996-10-01 DOI: 10.1016/S0020-7101(96)01225-1
Daniel de Roulet, Jean-Raoul Scherrer

Securing health information is an application domain which can learn more from other environments like airlines and banking than from military formalism or academic freedom. The techniques of the 80s using clear separation between public and private areas have to be upgraded. Propositions are made. Costs are evaluated.

保护健康信息是一个应用领域,可以从航空公司和银行等其他环境中学习,而不是从军事形式主义或学术自由中学习。80年代将公共区域和私人区域明确分开的技术必须得到改进。提出了一些建议。评估成本。
{"title":"Technical means for securing health information","authors":"Daniel de Roulet,&nbsp;Jean-Raoul Scherrer","doi":"10.1016/S0020-7101(96)01225-1","DOIUrl":"10.1016/S0020-7101(96)01225-1","url":null,"abstract":"<div><p>Securing health information is an application domain which can learn more from other environments like airlines and banking than from military formalism or academic freedom. The techniques of the 80s using clear separation between public and private areas have to be upgraded. Propositions are made. Costs are evaluated.</p></div>","PeriodicalId":75935,"journal":{"name":"International journal of bio-medical computing","volume":"43 1","pages":"Pages 39-44"},"PeriodicalIF":0.0,"publicationDate":"1996-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S0020-7101(96)01225-1","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"19923456","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
International journal of bio-medical computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1