IET Blockchain最新文献

筛选
英文 中文
Zero-trust-based security model against data breaches in the banking sector: A blockchain consensus algorithm 针对银行业数据泄露的零信任安全模型:区块链共识算法
IET Blockchain Pub Date : 2023-03-23 DOI: 10.1049/blc2.12028
Umair B. Chaudhry, Aysha K. M. Hydros
{"title":"Zero-trust-based security model against data breaches in the banking sector: A blockchain consensus algorithm","authors":"Umair B. Chaudhry,&nbsp;Aysha K. M. Hydros","doi":"10.1049/blc2.12028","DOIUrl":"https://doi.org/10.1049/blc2.12028","url":null,"abstract":"<p>Cyber security in the banking sector is of high importance nowadays. The rate of cyberattacks is spiking every year, and the implementation of strong cybersecurity models is required to ensure the confidentiality and integrity of data. Since protecting a bank requires a wide range of security practices, this paper focuses on protecting the bank resources from malicious actors and securing the transactions using a blockchain consensus mechanism that uses a zero-trust security approach among the participants in the transaction. In addition to the framework, an algorithm for blockchain-based online transactions was designed to make use of practical implementation in the future. The ideas formulated during the research and literature review were integrated to design the framework and the algorithm. The proposed framework ensures that the security of the banking sector can be enhanced by adopting the zero-trust concept and blockchain technology. The consensus algorithms used for the transaction make it immutable and decentralized. Zero-trust principles adopted in the model ensure the confidentiality and integrity of the banking system.</p>","PeriodicalId":100650,"journal":{"name":"IET Blockchain","volume":"3 2","pages":"98-115"},"PeriodicalIF":0.0,"publicationDate":"2023-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/blc2.12028","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50142222","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
K-Go: An executable formal semantics of Go language in K framework K-Go:K框架下Go语言的可执行形式语义
IET Blockchain Pub Date : 2023-03-13 DOI: 10.1049/blc2.12024
Can Zhao, Qin Liu, Zonghua Hu, Ze Yu, Dejun Wang, Bo Meng
{"title":"K-Go: An executable formal semantics of Go language in K framework","authors":"Can Zhao,&nbsp;Qin Liu,&nbsp;Zonghua Hu,&nbsp;Ze Yu,&nbsp;Dejun Wang,&nbsp;Bo Meng","doi":"10.1049/blc2.12024","DOIUrl":"https://doi.org/10.1049/blc2.12024","url":null,"abstract":"<p>Go is a relatively new programming language and has become one of the most important programming languages used widely in blockchain. A formal semantics plays an important role in program synthesis, analysis and verification. The existed formal semantics of Go are not executable and do not cover the core features, hence, this paper presents an executable formal semantics for Go, called K-Go, using rewriting logic in <math>\u0000 <semantics>\u0000 <mi>K</mi>\u0000 <annotation>$mathbb{K}$</annotation>\u0000 </semantics></math> framework to make sure the semantics is both executable and applicable. K-Go includes syntax, configuration and rules and covers the declaration and definition of basic types, basic expression, concurrency, main statement data reading and writing based on channel. K-Go is validated by test set with 100% semantic coverage based on the official test suite. The evaluation experiment shows that K-Go is correct. Using formal semantics of Go language, building Go program synthesis, analysis and verification tools is easy for analyzing more characteristics of Go programs.</p>","PeriodicalId":100650,"journal":{"name":"IET Blockchain","volume":"3 2","pages":"61-73"},"PeriodicalIF":0.0,"publicationDate":"2023-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/blc2.12024","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50140657","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Blockchain-based reliable image copyright protection 基于区块链的可靠图像版权保护
IET Blockchain Pub Date : 2023-03-02 DOI: 10.1049/blc2.12027
Xiangli Xiao, Xiaotong He, Yushu Zhang, Xuewen Dong, Lu-Xing Yang, Yong Xiang
{"title":"Blockchain-based reliable image copyright protection","authors":"Xiangli Xiao,&nbsp;Xiaotong He,&nbsp;Yushu Zhang,&nbsp;Xuewen Dong,&nbsp;Lu-Xing Yang,&nbsp;Yong Xiang","doi":"10.1049/blc2.12027","DOIUrl":"10.1049/blc2.12027","url":null,"abstract":"<p>The indiscriminate distribution of a large number of unlicensed images through the Internet seriously harms the benefits of image owners, which prompts the study of image copyright protection solutions. Existing blockchain-free solutions are limited to using centralized servers to store copyright information, leaving data vulnerable to being lost or tampered with by external attacks. Although the blockchain-based image copyright protection solutions are capable of addressing the above problem, improvements are needed in choosing a suitable blockchain platform and supporting integrated copyright life cycle management. To this end, this paper designs a blockchain-based reliable image copyright protection system named BB-RICP using Hyperledger Fabric. For one thing, the adoption of Fabric mitigates the limitations of other blockchain platforms represented by Ethereum in terms of efficiency, economy, and availability. For another, BB-RICP successes in achieving integrated copyright lifecycle management. In addition, BB-RICP achieves enhanced applicability performance by firstly introducing GM algorithms recommended by Chinese national standard and adapting the more consortium blockchain-oriented practical byzantine fault tolerance algorithm. Moreover, the adoption of spread spectrum watermarking brings convenience to users. Finally, Kubernetes is used to assist in the simulation of BB-RICP to verify that users can operate reliably in the blockchain network.</p>","PeriodicalId":100650,"journal":{"name":"IET Blockchain","volume":"3 4","pages":"222-237"},"PeriodicalIF":0.0,"publicationDate":"2023-03-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/blc2.12027","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82819508","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A decentralized crypto network with dynamic threshold change 具有动态阈值变化的去中心化加密网络
IET Blockchain Pub Date : 2023-02-21 DOI: 10.1049/blc2.12026
Wenpeng Song, Xin Pei, Ming Li
{"title":"A decentralized crypto network with dynamic threshold change","authors":"Wenpeng Song,&nbsp;Xin Pei,&nbsp;Ming Li","doi":"10.1049/blc2.12026","DOIUrl":"https://doi.org/10.1049/blc2.12026","url":null,"abstract":"<p>The threshold proxy re-encryption (tPRE) algorithm not only ensures the separation of data ownership and use right, but also prevents a single data proxy from doing evil. In order to avoid collusion of multiple data proxies, this paper constructs a decentralized crypto network (DCN) based on blockchain technology and tPRE. DCN is more than a key management system, while expanding the data storage capacity of blockchain network. Combined with existing distributed storage schemes, it can store massive data. Due to Byzantine failure in distributed networks, the data proxy nodes can join or leave at will. In order to ensure that the number of data proxy nodes in the DCN network meets the requirements of the re-encryption threshold, and the data authorization operation can be carried out smoothly, this paper presents a dynamic refresh method of tPRE fragments. When there are fragments that meet the threshold number in the network, the allocation of encrypted fragments can be adjusted non-interactivity and self-adaptively. Non-interactivity means that each data proxy node independently refreshes its old fragments into new fragments without collecting old fragments from other nodes in the DCN, and then distributes the new fragments to other data proxy nodes in the DCN. Self-adaptability refers to monitoring the changes of data proxy node sets in the DCN, and automatically refreshing fragments. Finally, the performance of critical algorithms is calculated in the proposal.</p>","PeriodicalId":100650,"journal":{"name":"IET Blockchain","volume":"3 2","pages":"116-122"},"PeriodicalIF":0.0,"publicationDate":"2023-02-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/blc2.12026","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50152998","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Blockchain-oriented location privacy preserving for cooperative spectrum sensing in 6G wireless networks 面向区块链的6G无线网络协同频谱感知位置隐私保护
IET Blockchain Pub Date : 2023-02-15 DOI: 10.1049/blc2.12025
Roopa Vuppula, Himansu Shekhar Pradhan
{"title":"Blockchain-oriented location privacy preserving for cooperative spectrum sensing in 6G wireless networks","authors":"Roopa Vuppula,&nbsp;Himansu Shekhar Pradhan","doi":"10.1049/blc2.12025","DOIUrl":"https://doi.org/10.1049/blc2.12025","url":null,"abstract":"<p>In this article, the authors proposed a novel blockchain-oriented location privacy-preserving (BoLPP) for the Cooperative Spectrum Sensing (CSS) in 6G networks. In order to attain the sustainability of privacy and security for 6G wireless networks, it is a great challenge in this sensing as it faces various malicious attacks while the secondary user (SU) is active. To tackle these issues, the authors proposed a novel framework for blockchain-oriented Cognitive Radio Networks (CRNs) for CSS using an energy detection technique. Moreover, the authors implemented another novel paradigm BoLPP, to attain the privacy of SUs location for CSS in 6G networks. This approach preserves the SUs’ location and makes the BoLPP framework immune to all malicious attackers. The simulation results have been undergone based on the performance metrics such as response time, consistency, probability of false alarm, frame loss (%), average network throughput, energy efficiency, and security. The outcomes reveal that the proposed scheme achieves high security, privacy, energy efficiency, average network throughput, and low probability of false alarm and frame loss (%) when compared with the existing frameworks such as Friend or Foe (FoF) and Tidal Trust Algorithm (TTA) mechanisms. It is observed that the proposed BoLPP mechanism provides better security and privacy in 6G wireless networks.</p>","PeriodicalId":100650,"journal":{"name":"IET Blockchain","volume":"3 2","pages":"74-97"},"PeriodicalIF":0.0,"publicationDate":"2023-02-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/blc2.12025","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50133219","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Waterfall: Gozalandia. Distributed protocol with fast finality and proven safety and liveness 瀑布:Gozalandia。分布式协议,快速终结,安全性和活跃性
IET Blockchain Pub Date : 2023-01-28 DOI: 10.1049/blc2.12023
Sergii Grybniak, Yevhen Leonchyk, Igor Mazurok, Oleksandr Nashyvan, Ruslan Shanin
{"title":"Waterfall: Gozalandia. Distributed protocol with fast finality and proven safety and liveness","authors":"Sergii Grybniak,&nbsp;Yevhen Leonchyk,&nbsp;Igor Mazurok,&nbsp;Oleksandr Nashyvan,&nbsp;Ruslan Shanin","doi":"10.1049/blc2.12023","DOIUrl":"10.1049/blc2.12023","url":null,"abstract":"<p>A consensus protocol is a crucial mechanism of distributed networks by which nodes can coordinate their actions and the current state of data. This article describes a BlockDAG consensus algorithm based on the Proof of Stake approach. The protocol provides network participants with cross-voting for the order of blocks, which, in the case of a fair vote, guarantees a quick consensus. Under conditions of dishonest behavior, cross-voting ensures that violations will be quickly detected. In addition, the protocol assumes the existence of a Coordinating network containing information about the approved ordering, which qualitatively increases security and also serves to improve network synchronization.</p>","PeriodicalId":100650,"journal":{"name":"IET Blockchain","volume":"3 4","pages":"182-193"},"PeriodicalIF":0.0,"publicationDate":"2023-01-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/blc2.12023","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89577277","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
An access control model for data security sharing cross-domain in consortium blockchain 联盟区块链中跨域数据安全共享的访问控制模型
IET Blockchain Pub Date : 2023-01-06 DOI: 10.1049/blc2.12022
Yang Liu, Weidong Yang, Yanlin Wang, Yang Liu
{"title":"An access control model for data security sharing cross-domain in consortium blockchain","authors":"Yang Liu,&nbsp;Weidong Yang,&nbsp;Yanlin Wang,&nbsp;Yang Liu","doi":"10.1049/blc2.12022","DOIUrl":"https://doi.org/10.1049/blc2.12022","url":null,"abstract":"<p>With the rapid increment of the demand for data sharing among parties, data is considered a cornerstone component to provide value in the big data environment. Concerns regarding sharing data security have impeded the development of cross-domain data interaction. Therefore, an access control model for data security sharing cross-domain is proposed, Fabric-ABAC, that is based on Hyperledger Fabric and Attribute-based Access Control (ABAC). In order to solve the data security challenges caused by a trusted central organization implementation, a distributed environment is constructed that consists of stakeholders among parties. The unified attribute model is designed for multi-environment combined with smart contracts. Fabric-ABAC realizes multi-level, fine-grained, and auditable access control, enabling data security through automatic permission verification. Considering the ledger is visible to all participants in consortium blockchain, it is necessary to protect the confidentiality of sensitive data. Thus, Proxy Re-Encryption (PRE), which is implemented by smart contracts, is adopted in the scheme to realize the ciphertext interaction without the third party. The security of PRE and the access control model used in Fabric-ABAC is discussed to show that a secure environment for data sharing is provided. Moreover, the completeness of the implementation and effectiveness of the system performance in the multi-domain environment is demonstrated in the experimental results.</p>","PeriodicalId":100650,"journal":{"name":"IET Blockchain","volume":"3 1","pages":"18-34"},"PeriodicalIF":0.0,"publicationDate":"2023-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/blc2.12022","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50133409","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A remote and cost-optimized voting system using blockchain and smart contract 使用区块链和智能合约的远程成本优化投票系统
IET Blockchain Pub Date : 2023-01-05 DOI: 10.1049/blc2.12021
Mohammad Nabiluzzaman Neloy, Md. Abdul Wahab, Sheikh Wasif, Abdulla All Noman, Mustafizur Rahaman, Tahmid Hasan Pranto, A. K. M. Bahalul Haque, Rashedur M. Rahman
{"title":"A remote and cost-optimized voting system using blockchain and smart contract","authors":"Mohammad Nabiluzzaman Neloy,&nbsp;Md. Abdul Wahab,&nbsp;Sheikh Wasif,&nbsp;Abdulla All Noman,&nbsp;Mustafizur Rahaman,&nbsp;Tahmid Hasan Pranto,&nbsp;A. K. M. Bahalul Haque,&nbsp;Rashedur M. Rahman","doi":"10.1049/blc2.12021","DOIUrl":"https://doi.org/10.1049/blc2.12021","url":null,"abstract":"<p>Traditional voting procedures are non-remote, time-consuming, and less secure. While the voter believes their vote was submitted successfully, the authority does not provide evidence that the vote was counted and tallied. In most cases, the anonymity of a voter is also not sure, as the voter's details are included in the ballot papers. Many voters consider this voting system untrustworthy and manipulative, discouraging them from voting, and consequently, an election loses a significant number of participants. Although the inclusion of electronic voting systems (EVS) has increased efficiency; however, it has raised concerns over security, legitimacy, and transparency. To mitigate these problems, blockchain technology has been leveraged and smart contract facilities with a combination of artificial intelligence (AI) to propose a remote voting system that makes the overall voting procedure transparent, semi-decentralized, and secure. In addition, a system that aids in boosting the number of turnouts in an election through an incentivization policy for the voters have also developed. Through the proposed virtual campaigning feature, the authority can generate a decent amount of revenue, which downsizes the overall cost of an election. To reduce the associated cost of transactions using smart contracts, this system implements a hybrid storage system where only a few cardinal data are stored in the blockchain network.</p>","PeriodicalId":100650,"journal":{"name":"IET Blockchain","volume":"3 1","pages":"1-17"},"PeriodicalIF":0.0,"publicationDate":"2023-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/blc2.12021","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50130380","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Blockchain technology in energy systems: A state-of-the-art review 能源系统中的区块链技术:最新综述
IET Blockchain Pub Date : 2022-12-21 DOI: 10.1049/blc2.12020
Moein Choobineh, Ali Arabnya, Behrouz Sohrabi, Amin Khodaei, Aleksi Paaso
{"title":"Blockchain technology in energy systems: A state-of-the-art review","authors":"Moein Choobineh,&nbsp;Ali Arabnya,&nbsp;Behrouz Sohrabi,&nbsp;Amin Khodaei,&nbsp;Aleksi Paaso","doi":"10.1049/blc2.12020","DOIUrl":"https://doi.org/10.1049/blc2.12020","url":null,"abstract":"<p>Blockchain is a powerful technology to facilitate decarbonization, decentralization, digitalization, and democratization (4D's) of the energy systems of the future. The 4D's are the driving forces of transition into new energy systems that are more sustainable, resilient, efficient, and equitable. Although this technology can be applied to a wide spectrum of applications in the power sector, a set of challenges and limitations still need to be addressed to facilitate a full-scope implementation in energy systems. This paper presents an overview of blockchain technology from its inception through its most recent evolution and presents a thematic review of state of the art in the application of this technology in power systems. Further, it addresses the barriers preventing the power sector from large-scale, full-scope adoption of this technology. Finally, the emerging blockchain trends in the near future will be discussed and its potential to facilitate a secure, decentralized energy trading platform will be investigated.</p>","PeriodicalId":100650,"journal":{"name":"IET Blockchain","volume":"3 1","pages":"35-59"},"PeriodicalIF":0.0,"publicationDate":"2022-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/blc2.12020","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50148411","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Building trust via blockchain in UAV-assisted ultra-dense 6G cellular networks 在无人机辅助的超密集6G蜂窝网络中通过区块链建立信任
IET Blockchain Pub Date : 2022-12-05 DOI: 10.1049/blc2.12018
Taotao Wang, Long Shi, Jessie Hui Wang, Zhe Wang, Xiumei Deng, Jun Li, Shengli Zhang
{"title":"Building trust via blockchain in UAV-assisted ultra-dense 6G cellular networks","authors":"Taotao Wang,&nbsp;Long Shi,&nbsp;Jessie Hui Wang,&nbsp;Zhe Wang,&nbsp;Xiumei Deng,&nbsp;Jun Li,&nbsp;Shengli Zhang","doi":"10.1049/blc2.12018","DOIUrl":"10.1049/blc2.12018","url":null,"abstract":"<p>The ultra-dense deployment of unmanned aerial vehicles (UAVs) as mobile small cell base stations (SBS) is expected to support ultra-high-speed, ultra-reliable, and ultra-low-latency wireless connections in sixth generation (6G) wireless cellular networks. Inevitably, the explosively increasing number of SBSs each with ever-shrinking cell size will result in the spectrum scarcity and pose critical challenges to the spectrum management. Towards the centralized spectrum management system, a third-party authority is employed to coordinate the spectrum sensing, sharing, and allocation among participants. However, a centralized authority is vulnerable to numerous security threats, such as single point of failure, denial of service attacks, and privacy disclosure, and cannot guarantee fair and efficient spectrum management without mutual trusts among participants. To address these problems, a novel framework of blockchain-aided spectrum management is designed to securely record the spectrum auction data and spectrum allocation data in the decentralized spectrum sharing. Moreover, a trust management scheme is proposed to evaluate the trusts of all UAVs participating in the decentralized spectrum sharing, where the trust increase depends on legal use of spectrum allocation and honest report of spectrum sensing. In particular, it is shown that the proposed trust management can not only incentivize the UAVs to comply with the legal rule of spectrum sharing in blockchain, but also punish the malicious behaviour that either violates the spectrum sharing rule or provides misleading spectrum sensing results.</p>","PeriodicalId":100650,"journal":{"name":"IET Blockchain","volume":"2 3-4","pages":"67-76"},"PeriodicalIF":0.0,"publicationDate":"2022-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/blc2.12018","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83048462","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信