Journal of Discrete Mathematical Sciences and Cryptography最新文献

筛选
英文 中文
Robust video watermarking algorithm based on motion frames and encryption 基于运动帧和加密的鲁棒视频水印算法
Journal of Discrete Mathematical Sciences and Cryptography Pub Date : 2023-01-01 DOI: 10.47974/jdmsc-1748
Praful Saxena, Santosh Kumar
{"title":"Robust video watermarking algorithm based on motion frames and encryption","authors":"Praful Saxena, Santosh Kumar","doi":"10.47974/jdmsc-1748","DOIUrl":"https://doi.org/10.47974/jdmsc-1748","url":null,"abstract":"Rapidly growing technologies over the internet are used to transfer digital media content at a high rate nowadays. The growth in these technologies results in the creation of identical copies of original multimedia data easily. The creation of these identical copies states the false claim of the ownership of digital media by any malicious user. The proposed method suggests protecting these types of the false claim by inserting a watermark into selected motion frames. Before embedding the watermark, it is scrambled by using an algorithm having a secret key. With help of this key, the scrambled watermark will be reconstructed whenever it is required. With the help of DWT method along with using SVD technique watermark is inserted into the selected frame from the original media. The results of the proposed algorithm show that the scheme is secure and robust against different types of attacks whether it is intentional and unintentional. The proposed scheme is found more secure for the protection of false claims of malicious users over digital media.","PeriodicalId":193977,"journal":{"name":"Journal of Discrete Mathematical Sciences and Cryptography","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135355359","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Quantum Digital Signatures (QDS): A novel approach to safeguarding electronic health records 量子数字签名:一种保护电子健康记录的新方法
Journal of Discrete Mathematical Sciences and Cryptography Pub Date : 2023-01-01 DOI: 10.47974/jdmsc-1837
Bhavna Saini, Vivek Kumar Verma, Pradeep Kumar Tiwari, Mudunuri Venkata Chaitanya Varma
{"title":"Quantum Digital Signatures (QDS): A novel approach to safeguarding electronic health records","authors":"Bhavna Saini, Vivek Kumar Verma, Pradeep Kumar Tiwari, Mudunuri Venkata Chaitanya Varma","doi":"10.47974/jdmsc-1837","DOIUrl":"https://doi.org/10.47974/jdmsc-1837","url":null,"abstract":"Electronic Health Records (EHRs) form the backbone of modern healthcare, ensuring seamless access to a patient’s medical history and fostering effective patient-doctor relationships. Their digital nature, however, exposes them to myriad security threats, including unauthorized access, tampering, and fraudulent alterations. Traditional cryptographic techniques, while effective in the current digital landscape, might not stand robust against future threats, especially those posed by quantum computers. This paper introduces Quantum Digital Signatures (QDS) as a cutting-edge approach to address this burgeoning concern. QDS leverages the principles of quantum mechanics to provide an additional layer of security, making it computationally infeasible for adversaries to forge or alter signed messages, including sensitive EHR data. Unlike conventional digital signatures that depend on the presumed difficulty of certain mathematical problems, the security attributes of QDS stem from the fundamental laws of quantum physics, ensuring a higher level of integrity and authenticity. We present a comprehensive overview of the QDS protocol and its integration into current EHR systems. Our comparative analysis with existing cryptographic techniques illuminates the advantages of QDS, especially in preventing undetected alterations and ensuring non-repudiation. Practical deployment challenges, including quantum device imperfections and potential integration bottlenecks, are also addressed. The adoption of Quantum Digital Signatures in safeguarding EHRs ushers in a new era of medical data security. While the large-scale implementation of such quantum technologies is still in its infancy, proactive research and early adoption are pivotal in preparing healthcare systems for future challenges. Through this research, we advocate for the broader integration of quantum cryptographic techniques, such as QDS, to uphold the sanctity and trustworthiness of electronic medical data in the face of evolving digital threats.","PeriodicalId":193977,"journal":{"name":"Journal of Discrete Mathematical Sciences and Cryptography","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135355445","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A computational computing system and its implementation for resource broker in IoT 物联网资源代理计算系统及其实现
Journal of Discrete Mathematical Sciences and Cryptography Pub Date : 2023-01-01 DOI: 10.47974/jdmsc-1763
Vijay Prakash Sharma, Shikha Sharma, Dhiraj Kapila, Laxmi Saraswat, José Luis Arias-Gonzáles, Juan Carlos Cotrina-Aliaga, Dinesh Goyal
{"title":"A computational computing system and its implementation for resource broker in IoT","authors":"Vijay Prakash Sharma, Shikha Sharma, Dhiraj Kapila, Laxmi Saraswat, José Luis Arias-Gonzáles, Juan Carlos Cotrina-Aliaga, Dinesh Goyal","doi":"10.47974/jdmsc-1763","DOIUrl":"https://doi.org/10.47974/jdmsc-1763","url":null,"abstract":"In the computing world Internet of Things or even more normally IoT is an arising idea in the specialized world. We need more solace in our life. The web has turned into a centerpiece of our life. This IoT depends on this coordinated effort of solace and the Web. open new security challenges in light of multiple factors. First and foremost, security techniques should be adjusted because proposed calculation that in view of appropriated design require extra various agents and different correspondence principles that might increment security dangers and increment security the executive’s intricacy. Besides, proposed calculation is intrinsically missing productive security highlights since it performs username/secret word-based validation in a plain text, that safeguarded by cryptographic convention SSL/TSL which is not consider as lightweight convention for assets obliged gadgets. This paper will introduce scientific categorization and acknowledgment interaction of IoT confirmation conspire. Moreover, the paper will talk about difficulties of applying validation components for IoT frameworks that in view of circulated.","PeriodicalId":193977,"journal":{"name":"Journal of Discrete Mathematical Sciences and Cryptography","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135355933","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Orthogonality of generalized G-m-derivations in semi-prime G-nearrings 半素数g -近环上广义g -m导的正交性
Journal of Discrete Mathematical Sciences and Cryptography Pub Date : 2023-01-01 DOI: 10.47974/jdmsc-1634
Hiba A. Ahmed
{"title":"Orthogonality of generalized G-m-derivations in semi-prime G-nearrings","authors":"Hiba A. Ahmed","doi":"10.47974/jdmsc-1634","DOIUrl":"https://doi.org/10.47974/jdmsc-1634","url":null,"abstract":"We introduced the nomenclature of orthogonal G -m-derivations and orthogonal generalized G -m-derivations in semi-prime G -near-rings and provide a few essentials and enough provision for generalized G -n-derivations in semi-prime G -near-rings by orthogonal.","PeriodicalId":193977,"journal":{"name":"Journal of Discrete Mathematical Sciences and Cryptography","volume":"141 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135845187","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Kidney stone classification using deep learning neural network 利用深度学习神经网络进行肾结石分类
Journal of Discrete Mathematical Sciences and Cryptography Pub Date : 2023-01-01 DOI: 10.47974/jdmsc-1762
Nisha Vasudeva, Vivek Kumar Sharma, Shashi Sharma, Ravi Shankar Sharma, Satyajeet Sharma, Gajanand Sharma
{"title":"Kidney stone classification using deep learning neural network","authors":"Nisha Vasudeva, Vivek Kumar Sharma, Shashi Sharma, Ravi Shankar Sharma, Satyajeet Sharma, Gajanand Sharma","doi":"10.47974/jdmsc-1762","DOIUrl":"https://doi.org/10.47974/jdmsc-1762","url":null,"abstract":"Kidney stones are the common problem in the healthcare system. It is rapidly increasing day by day and becomes a global health crisis in worldwide. Various deep learning algorithms are used for classificationof stone in kidney area. The computer aided design approach can be used for assist doctor for finding out the stone in kidney area. For kidney transplantation and dialysis, a proper treatment is required. It is important to have reliable techniques for predicting kidney stone size atits early stages. Different machine learning (ML) algorithmsare given excellent results in predicting stone. In this paper, clinicaldata is used for predicting of stone in kidney. If data have some missing values, data unbalancing problem then machine learning algorithms assist to solve this problem in which includes data preprocessing, a technique for managing missing values, data aggregation, feature extraction and prediction of result by evaluating values. In this study, deep learning algorithm for classification of kidney stone sizes automatically on the patient’s dataset is used. A total of 1000 patient’s dataset are used for finding out kidney stone size i.e., large or small. The binary classification algorithm is used for classification of stone size. We observed that our model gives best result for classification of kidney stone image size.","PeriodicalId":193977,"journal":{"name":"Journal of Discrete Mathematical Sciences and Cryptography","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135355619","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Machine Learning (ML)–centric resource security in cloud computing using authenticated key 云计算中使用认证密钥的以机器学习(ML)为中心的资源安全
Journal of Discrete Mathematical Sciences and Cryptography Pub Date : 2023-01-01 DOI: 10.47974/jdmsc-1768
Ravi Shankar Saxena, Smaranika Mohapatra, Amit Kumar Singh, Bhupati Bhupati, Juan Carlos Cotrina-Aliaga, José Luis Arias-Gonzáles, Sarvesh Kumar
{"title":"Machine Learning (ML)–centric resource security in cloud computing using authenticated key","authors":"Ravi Shankar Saxena, Smaranika Mohapatra, Amit Kumar Singh, Bhupati Bhupati, Juan Carlos Cotrina-Aliaga, José Luis Arias-Gonzáles, Sarvesh Kumar","doi":"10.47974/jdmsc-1768","DOIUrl":"https://doi.org/10.47974/jdmsc-1768","url":null,"abstract":"The computing is the on-request transportation of registering contributions over the web to give speedier advancement, bendy assets, and economies of scale. Administrations incorporate servers, stockpiling, data sets, systems administration, programming, and examination. The routine security tasks that the providers carry out include protecting the basic system, reaching, maintaining, and setting up the actual has and organization, on which the strategy illustrations run, as well as the capacity and unique possessions.","PeriodicalId":193977,"journal":{"name":"Journal of Discrete Mathematical Sciences and Cryptography","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135355621","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A mechanism to ensure identity-based anonymity and authentication for IoT infrastructure using cryptography 一种使用加密技术确保物联网基础设施基于身份的匿名和身份验证的机制
Journal of Discrete Mathematical Sciences and Cryptography Pub Date : 2023-01-01 DOI: 10.47974/jdmsc-1827
Suresh Limkar, Wankhede Vishal Ashok, Sanjeev Singh, Amrik Singh, Sharmila K. Wagh, Samir N. Ajani
{"title":"A mechanism to ensure identity-based anonymity and authentication for IoT infrastructure using cryptography","authors":"Suresh Limkar, Wankhede Vishal Ashok, Sanjeev Singh, Amrik Singh, Sharmila K. Wagh, Samir N. Ajani","doi":"10.47974/jdmsc-1827","DOIUrl":"https://doi.org/10.47974/jdmsc-1827","url":null,"abstract":"The spread of the Internet of Things (IoT) has caused a variety of devices to communicate with one another, producing enormous volumes of data and nurturing a linked ecosystem. However, the privacy of users, the integrity of the data, and secure authentication are seriously jeopardised by this link. In this context, we suggest a unique technique that makes use of identity-based anonymity and cryptographic authentication in IoT infrastructure in order to solve these problems.In order to facilitate safe communications between IoT devices, users, and service providers, our proposed mechanism creates a third-party authenticated protocol. This anonymity protection reduces the danger of unauthorised tracking and data exploitation by securing user names and usage patterns from possible attackers.The proposed system ensures the integrity and confidentiality of data transmitted between IoT devices and service providers by utilising sophisticated encryption algorithms. Additionally, it simplifies the authentication procedure, improving system efficiency overall without sacrificing security. The proposed technique into practise and assessed it using real-world IoT infrastructure scenarios, showcasing how well it protects user privacy and ensures safe communication. The findings show that the mechanism has a low computing cost and can withstand a range of security threats, making it a viable option for identity-based anonymity and authentication in IoT networks. Our approach makes a significant contribution to protecting user data and encouraging trustworthy interactions in IoT infrastructure as the IoT environment continues to grow.","PeriodicalId":193977,"journal":{"name":"Journal of Discrete Mathematical Sciences and Cryptography","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135357937","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A holistic mathematical cyber security model in fog resource management in computing environments 计算环境下雾资源管理中的整体网络安全数学模型
Journal of Discrete Mathematical Sciences and Cryptography Pub Date : 2023-01-01 DOI: 10.47974/jdmsc-1770
Dasharathraj Shetty, Syam Machinathu Parambil Gangadharan, K. Arumugam, Shaziya Islam, K. V. Daya Sagar, Juan Carlos Cotrina-Aliaga, Surendra Kumar
{"title":"A holistic mathematical cyber security model in fog resource management in computing environments","authors":"Dasharathraj Shetty, Syam Machinathu Parambil Gangadharan, K. Arumugam, Shaziya Islam, K. V. Daya Sagar, Juan Carlos Cotrina-Aliaga, Surendra Kumar","doi":"10.47974/jdmsc-1770","DOIUrl":"https://doi.org/10.47974/jdmsc-1770","url":null,"abstract":"Now a days Cloud computing isn’t common sense for some Internet of things applications, fog enrolling is every now and again used. Its proper methodology keeps an eye on the necessities of IoT and present-day IoT, as well as the enormous proportion of splendid data sensors and IoT gadgets, produce, which would be extreme and drawn-out to send off the cloud for dealing with and examination. Fog enrolling diminishes the information move limit required and reduces the unstable correspondence among sensors and the cloud, which can antagonistically impact IoT execution. Fog is exceptionally conveyed and comprises a wide number of independent end gadgets, which add to the handling. In any case, the range of gadgets presented across various clients is not examined. Consequently, the security of fog computing is a main pressing issue that ought to come into thought. Thusly, to give the vital security to fog computing, there is a need to comprehend what the security concerns are with respect to fog. Fog computing is a decentralized enlisting establishment where data, handling, storing, and applications are seen as some place near the data source and the cloud. Like edge enrolling, murkiness figuring brings the advantages and power of the cloud closer to where data is made and circled back to. With fog computing, close-by data amassing and examination of time-delicate data become more direct. With this the aggregate and the distance of data passed to the cloud are diminished, thus lessening the impact of well-being and security issues.","PeriodicalId":193977,"journal":{"name":"Journal of Discrete Mathematical Sciences and Cryptography","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135356157","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Securing wireless sensor network from node capture attack using an efficient optimization defense strategy model 利用高效的优化防御策略模型保护无线传感器网络免受节点捕获攻击
Journal of Discrete Mathematical Sciences and Cryptography Pub Date : 2023-01-01 DOI: 10.47974/jdmsc-1771
Amara S A L G Gopala Gupta, Syam Prasad Gudapati, Praveen Tumuluru
{"title":"Securing wireless sensor network from node capture attack using an efficient optimization defense strategy model","authors":"Amara S A L G Gopala Gupta, Syam Prasad Gudapati, Praveen Tumuluru","doi":"10.47974/jdmsc-1771","DOIUrl":"https://doi.org/10.47974/jdmsc-1771","url":null,"abstract":"Wireless Sensor Networks (WSNs) are a promising evolving technology for recent real-world applications in collaborative settings. These applications ranging from household monitoring to crucial military applications transmit critical data and thus more challenging approaches are required for providing security. In WSNs, a node capture attack (NCA) is a more serious attack among various attacks which supports an impostor to perform different network (NW) operations, and thereby the security of the entire NW is compromised easily. For conquering the surpassing issues of sensitivity-related techniques and for enhancing the NCA’s AE, we establish the NCA technique amalgamating several objectives like speed and location to lessen comprehensive intricacy. For securing the NW out of the NCA, this study proffers Improved Flower Pollination Optimization Defense Strategy Algorithm (IFPODSA) intending to compute the multiple objective functions for effectual chief administration procedure employing Hankel matrix formation. This proffered IFPODSA is correlated with two prevailing methodologies like Fruit Fly Optimization Algorithm (FFOA) and Finding Robust Assailant Optimization-Particle Swarm Optimization and Genetic Algorithm (FRAOPSOGA) concerning diverse criteria. Consequently, it has been observed that the proffered IFPODSA attains 458.7 kbps of throughput, 81.56% of PDR, 18.2% of energy consumption, and 64.36% of overhead.","PeriodicalId":193977,"journal":{"name":"Journal of Discrete Mathematical Sciences and Cryptography","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135356592","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
C-QoS-AOMDV: A cluster based QoS aware multipath routing protocol for MANET using hybrid soft computing techniques C-QoS-AOMDV:使用混合软计算技术的基于集群的QoS感知多路径路由协议
Journal of Discrete Mathematical Sciences and Cryptography Pub Date : 2023-01-01 DOI: 10.47974/jdmsc-1757
Bhawana Sharma, Deepika Saxena
{"title":"C-QoS-AOMDV: A cluster based QoS aware multipath routing protocol for MANET using hybrid soft computing techniques","authors":"Bhawana Sharma, Deepika Saxena","doi":"10.47974/jdmsc-1757","DOIUrl":"https://doi.org/10.47974/jdmsc-1757","url":null,"abstract":"Mobile ad hoc networks (MANETs) favour flexible routing protocols because a single route exceeds certain limits. It has many advantages over one-way routing approaches, including high productivity, low end latency, high energy efficiency, and long network life expectancy. As MANET terminals are powered by batteries, energy efficiency is a crucial requirement for many applications. C-QoS-AOMDV is a cluster-based QoS-aware multipath routing protocol for MANET that uses hybrid soft computing techniques to further improve QoS. The main contributions of proposed C-QoS-AOMDV routing protocol are given as follows. In C-QoS-AOMDV routing protocol, we present a modified bird mating optimization (MBMO) clustering technique which reduces the total energy consumption of the network. We compute cluster head (CH) based on the multiple constrains for data transmission between cluster members to corresponding CH node. Then, the mine blast optimization (MBO) algorithm is used to optimize multiple constrains to compute trust degree and maximum trust degree to select CH. Third, we illustrate hierarchical decision tree based deep neural network (HDT-DNN) which is used to compute the next intermediate node for further data transfer between one CH to another CH. Finally, the proposed C-QoS-AOMDV routing protocol is implemented in Network Simulator (NS-3) and the results are compared to the cutting-edge technology protocols AOMDV, AOMDV-QoS, and GE-QoS-AOMDV.","PeriodicalId":193977,"journal":{"name":"Journal of Discrete Mathematical Sciences and Cryptography","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135104765","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信