2017 International Carnahan Conference on Security Technology (ICCST)最新文献

筛选
英文 中文
Unique signatures from printed circuit board design patterns and surface mount passives 印刷电路板设计模式和表面贴装被动元件的独特签名
2017 International Carnahan Conference on Security Technology (ICCST) Pub Date : 2017-10-01 DOI: 10.1109/CCST.2017.8167796
J. Hamlet, Mitchell Martin, Nathan J. Edwards
{"title":"Unique signatures from printed circuit board design patterns and surface mount passives","authors":"J. Hamlet, Mitchell Martin, Nathan J. Edwards","doi":"10.1109/CCST.2017.8167796","DOIUrl":"https://doi.org/10.1109/CCST.2017.8167796","url":null,"abstract":"Counterfeiting or surreptitious modification of electronic systems is of increasing concern, particularly for critical infrastructure and national security systems. Such systems include avionics, medical devices, military systems, and utility infrastructure. We present experimental results from an approach to uniquely identify printed circuit boards (PCBs) on the basis of device unique variations in surface mount passive components and wire trace patterns. We also present an innovative approach for combining measurements of each of these quantities to create unique, random identifiers for each PCB and report the observed entropy, reliability, and uniqueness of the signatures. These unique signatures can be used directly for verifying the integrity and authenticity of the PCBs, or can serve as the basis for generating cryptographic keys for more secure authentication of the devices during system acquisition or field deployment. Our results indicate that the proposed approaches for measuring and combining these quantities are capable of generating high-entropy, unique signatures for PCBs. The techniques explored do not require system designers to utilize specialized manufacturing processes and implementation is low-cost.","PeriodicalId":371622,"journal":{"name":"2017 International Carnahan Conference on Security Technology (ICCST)","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126574898","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Token-based policy management (TBPM): A reliable data classification and access management schema in clouds 基于令牌的策略管理(TBPM):云中的可靠数据分类和访问管理模式
2017 International Carnahan Conference on Security Technology (ICCST) Pub Date : 2017-10-01 DOI: 10.1109/CCST.2017.8167836
Faraz Fatemi Moghaddam, P. Wieder, R. Yahyapour
{"title":"Token-based policy management (TBPM): A reliable data classification and access management schema in clouds","authors":"Faraz Fatemi Moghaddam, P. Wieder, R. Yahyapour","doi":"10.1109/CCST.2017.8167836","DOIUrl":"https://doi.org/10.1109/CCST.2017.8167836","url":null,"abstract":"Despite the considerable benefits of cloud computing as an emerging technology, there are some reliability and privacy concerns such as generating and managing access policies according to sensitivity of stored data in cloud storages. The most challenging issue in current information policy models is managing security levels, mapping between access requests and defined policies and considering the flexibility and scalability of this management schema according to the characteristics of cloud computing models. Accordingly, an efficient token-based access model has been presented in this paper to provide a semantic mapping between access requests of cloud users and defined policies and sub-policies of cloud customers according to the authentication and access management protocols of protection ontology. Furthermore, a policy-based session token has been introduced to enhance the reliability of access, decrease the time of mapping by eliminating un-necessary mapping from checked policies and decrease data overhead of by classification of policies and sub-policies.","PeriodicalId":371622,"journal":{"name":"2017 International Carnahan Conference on Security Technology (ICCST)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127853914","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Experiences with implementation of information systems within preparation to deal with crisis situations in terms of crisis management and building resilience in the Slovak Republic 在斯洛伐克共和国的危机管理和建立复原力方面,在应对危机情况的准备工作中实施信息系统的经验
2017 International Carnahan Conference on Security Technology (ICCST) Pub Date : 2017-10-01 DOI: 10.1109/CCST.2017.8167821
J. Ristvej, Lubomira Sokolova, Jana Starackova, R. Ondrejka, M. Lacinák
{"title":"Experiences with implementation of information systems within preparation to deal with crisis situations in terms of crisis management and building resilience in the Slovak Republic","authors":"J. Ristvej, Lubomira Sokolova, Jana Starackova, R. Ondrejka, M. Lacinák","doi":"10.1109/CCST.2017.8167821","DOIUrl":"https://doi.org/10.1109/CCST.2017.8167821","url":null,"abstract":"This paper is based on the experiences with implementation of information systems within preparation to deal with crisis situations in terms of crisis management in the Slovak Republic with Introduction to the state of the art, the Unified Information System of Economic Mobilization and Development in Slovakia of the Program and Information System — EPSIS®JISHM. We also focus on new challenges in this field. The paper includes of introduction, conclusions and 3 main parts: The Current Status and Direction of Information Systems Implementation in Crisis Management in Slovakia, the Unified Information System of Economic Mobilization and Development of the Program EPSIS® JISHM, New Challenges in the Field of Information Systems for Crisis Management with a Focus on Preparation for Crisis Situations. Gradually, the information systems have become an essential part of crisis management. Implementation of these systems into practice revealed many obstacles of this process and the examples taken from the practice prove that it is still necessary to pay special attention to this area. On one hand, in the field of implementation, it is necessary to regard bringing good practices from abroad (so called Best Practices) and learn from the possible failures and potential problems. For further development in this area, it is extremely important not only to implement outmoded and unused information systems from abroad but mainly to create new information systems and application software or adapt modern information systems and application software for the conditions in the Slovak Republic. Certainly, we shall not forget the cooperation and joint development of new information systems which would take advantage of knowledge and creative suggestions of all parties involved. The aim of this article is to familiarize readers with the experience with information systems implementation within the preparation for the crisis situation solutions in the conditions of crisis management in Slovakia.","PeriodicalId":371622,"journal":{"name":"2017 International Carnahan Conference on Security Technology (ICCST)","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133001454","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
A comparative study of palmprint feature extraction methods for contact-less biometrics under different environmental conditions 不同环境条件下非接触式生物识别掌纹特征提取方法的比较研究
2017 International Carnahan Conference on Security Technology (ICCST) Pub Date : 2017-10-01 DOI: 10.1109/CCST.2017.8167806
Belén Ríos-Sánchez, Miguel Viana-Matesanz, C. S. Ávila
{"title":"A comparative study of palmprint feature extraction methods for contact-less biometrics under different environmental conditions","authors":"Belén Ríos-Sánchez, Miguel Viana-Matesanz, C. S. Ávila","doi":"10.1109/CCST.2017.8167806","DOIUrl":"https://doi.org/10.1109/CCST.2017.8167806","url":null,"abstract":"Interest on palmprint biometrics has experimented a strong growth in the last decades due to its useful characteristics as uniqueness, permanence, reliability, user-friendliness, acceptability, non-intrusiveness, and low cost of the acquisition devices, which make it attractive for civil and commercial applications. Accordingly, a wide research has been developed in this field. Nevertheless, there is a lack of evaluation of the results under a common framework which permits to obtain a fair comparison between different methods. In this work an evaluation methodology based on the definitions suggested by the ISO/IDE 19795 norm is provided and applied to evaluate different palmprint feature extraction methods and matching approaches in terms of accuracy and computation time, offering a basis against which to compare future research. Given the growing trend towards touch-less biometrics promoted by the increase in the use of mobile devices, the evaluation has been carried out using two different contact-less hand databases. First database was recorded under totally controlled environmental conditions and providing the user some feedback about the recorded images during the acquisition process, while second database introduces lighting variations as well as no-pose restrictions during the capture.","PeriodicalId":371622,"journal":{"name":"2017 International Carnahan Conference on Security Technology (ICCST)","volume":"88 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133072453","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An integrated internet of everything — Genetic algorithms controller — Artificial neural networks framework for security/safety systems management and support 万物互联-遗传算法控制器-用于安全/安全系统管理和支持的人工神经网络框架
2017 International Carnahan Conference on Security Technology (ICCST) Pub Date : 2017-10-01 DOI: 10.1109/CCST.2017.8167863
F. Garzia, M. Lombardi, S. Ramalingam
{"title":"An integrated internet of everything — Genetic algorithms controller — Artificial neural networks framework for security/safety systems management and support","authors":"F. Garzia, M. Lombardi, S. Ramalingam","doi":"10.1109/CCST.2017.8167863","DOIUrl":"https://doi.org/10.1109/CCST.2017.8167863","url":null,"abstract":"Security/Safety is managed, mostly, by means of integrated systems which have to consider, more and more, sensors, devices, cameras, mobile terminals, wearable devices, etc. that use wireless networks, to ensure protection of people and/or tangible/intangible assets from voluntary attacks, allowing also the safe management of the related consequent emergency situations that can derive from the above mentioned voluntary attacks. These aims can be achieved using integrated systems and innovative technologies, such as Internet of Everything (IoE) which can connect people, things (mobile terminals, smart sensors, devices, actuators; wearable devices; etc.), data/information/knowledge and particular processes. An integrated security system can therefore be considered as an IoE system where several devices, sensors, cameras, people, etc. interact, generating a huge volume of data and information that is necessary to transmit, analyze and eventually store for security purposes and, ultimately, for emergency management derived from voluntary attacks. This means that it is necessary to use suitable tools capable of analyzing, in a smart way, the huge volume of information to achieve the desired security/safety objectives and eventual emergency management of critical situations. The purpose of the paper is to illustrate an integrated IoE-GACs-ANNs based framework which can support and manage security/safety systems that operate in complex environments, characterized by a multitude of sensors, devices, etc. and the related results obtained from theoretical, computational and practical point of view, where it has been applied.","PeriodicalId":371622,"journal":{"name":"2017 International Carnahan Conference on Security Technology (ICCST)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130024648","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
VoKA: Voronoi K-aggregation mechanism for privacy in location-based information systems VoKA:基于位置的信息系统中隐私的Voronoi k聚合机制
2017 International Carnahan Conference on Security Technology (ICCST) Pub Date : 2017-10-01 DOI: 10.1109/CCST.2017.8167857
M. Zurbarán, P. Wightman
{"title":"VoKA: Voronoi K-aggregation mechanism for privacy in location-based information systems","authors":"M. Zurbarán, P. Wightman","doi":"10.1109/CCST.2017.8167857","DOIUrl":"https://doi.org/10.1109/CCST.2017.8167857","url":null,"abstract":"Location based information systems have shown a sustained growth trend in the last decade, thanks to the appearance of smartphones, capable of locating a user in real time and with great accuracy. Current users of mobile apps are normally sharing their location which is being stored by the service providers, either for internal use, to be sold later to third party companies, or to be released for public use as open data. The last two uses require the data to be stripped of information of individuals so it cannot allow identification; however, if the location is not altered sufficiently, it still could be used to find a single person. In the literature there are many location privacy protection mechanisms — LPPMs, usually expected to be applied on real time over the location information. This work introduces VoKA, a, offline privacy protection technique that focuses at the moment in which the data is released outside a protected environment, proposing a new aggregation mechanism based on Voronoi diagrams and K anonymity that preserves geographical value of the data like density and geographical distribution. The study uses Twitter data from the Lombardia area of Italy, and compares unaltered data, obfuscated data, grid-based aggregation and VoKA. Results show that VoKA can aggregate data in a more organic manner than grid-based data, and reduces the possibility to identify individuals compared to simple location obfuscation, in geostatistical analysis techniques like entropy and heatmap.","PeriodicalId":371622,"journal":{"name":"2017 International Carnahan Conference on Security Technology (ICCST)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123704848","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
The Shakespeare experiment: Preliminary results for the recognition of a person based on the sound of walking 莎士比亚实验:根据走路的声音来识别一个人的初步结果
2017 International Carnahan Conference on Security Technology (ICCST) Pub Date : 2017-10-01 DOI: 10.1109/CCST.2017.8167839
Patrick A. H. Bours, Adrian Evensen
{"title":"The Shakespeare experiment: Preliminary results for the recognition of a person based on the sound of walking","authors":"Patrick A. H. Bours, Adrian Evensen","doi":"10.1109/CCST.2017.8167839","DOIUrl":"https://doi.org/10.1109/CCST.2017.8167839","url":null,"abstract":"Gait Recognition is a behavioural biometric that has been investigated for a few decades now. Various sensors can be used in this research. Most research is using video capture and various methods for analyzing the video. This method is well suited in case of user identification and has proven its value in court cases as forensic evidence. Another way to do gait recognition is using wearable sensors, most often accelerometers, which are available in any modern smart phone. In this case, the collected acceleration data can be matched against a profile of the gait of the owner of the phone and it can be established if the person carrying the phone is the owner or not. Less gait recognitions research has been done using other kinds of sensors. For example, floor sensors have been used, creating a situation where for example an entrance to a building or part of a building can be secured by measure the ground reaction force of someone walking on this specially equipped floor. As was noted by Shakespeare already (e.g. in The Tempest he writes: Highst Queen of state, Great Juno comes; I know her by her gait), can people also be recognized by the sound of their walking. In this paper, we will describe our preliminary results of analyzing the recorded sound of a person walking. As an homage to Shakespeare for “initiating” the field of biometric sound-based gait recognition over 400 years ago, has our experiment been termed “The Shakespeare Experiment (TSE)”. The participants in this experiment wore two different types of shoes, where the soles were significantly different to provide distinct differences in the sound. We have analyzed our data both in a same-shoe and a cross-shoe setting. In an identification setting we obtained an initial recognition accuracy of nearly 80%.","PeriodicalId":371622,"journal":{"name":"2017 International Carnahan Conference on Security Technology (ICCST)","volume":"107 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125076171","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Person re-identification from CCTV silhouettes using generic fourier descriptor 利用通用傅里叶描述符对CCTV剪影进行人物再识别
2017 International Carnahan Conference on Security Technology (ICCST) Pub Date : 2017-10-01 DOI: 10.1109/CCST.2017.8167840
Rawabi Alsedais, R. Guest
{"title":"Person re-identification from CCTV silhouettes using generic fourier descriptor","authors":"Rawabi Alsedais, R. Guest","doi":"10.1109/CCST.2017.8167840","DOIUrl":"https://doi.org/10.1109/CCST.2017.8167840","url":null,"abstract":"Person re-identification in public areas (such as airports, train stations and shopping malls) has recently received increased attention within computer vision research due, in part, to the demand for enhanced levels of security. Re-identifying subjects within non-overlapped camera networks can be considered as a challenging task. Illumination changes in different scenes, variations in camera resolutions, field of view and human natural motion are the key obstacles to accurate implementation. This study assesses the use of Generic Fourier Shape Descriptors (GFD) on person silhouettes for re-identification and furthermore identifies which sections of a subjects' silhouette is able to deliver optimum performance. Human silhouettes of 90 subjects from the CASIA dataset walking 0° and 90° to a fixed CCTV camera were used for the purpose of re-identification. Each subject's video sequence comprised between 10 and 50 frames. For both views, silhouettes were segmented into eight algorithmically-defined areas: head and neck, shoulders, upper 50%, lower 50%, upper 15%, middle 35%, lower 40% and whole body. A GFD was used independently on each segment at each angle. After extracting the GFD feature for each frame, a linear discriminant analysis (LDA) classifier was used to investigate re-identification accuracy rate, where 50% of each subject's frames were used for training and the other 50% were used for testing. The results show that 97% identification accuracy rate at the 10th rank is achieved by using GFD on the upper 50% segment of the human silhouette front (0°) side. For 90° images, using GFD on the upper 15% silhouette segment resulted in almost 98% accuracy rate at the 10th rank.","PeriodicalId":371622,"journal":{"name":"2017 International Carnahan Conference on Security Technology (ICCST)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125224436","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Mobile biometrics: Towards a comprehensive evaluation methodology 移动生物识别:迈向一个全面的评估方法
2017 International Carnahan Conference on Security Technology (ICCST) Pub Date : 2017-10-01 DOI: 10.1109/CCST.2017.8167859
Attaullah Buriro, Z. Akhtar, B. Crispo, Sandeep Gupta
{"title":"Mobile biometrics: Towards a comprehensive evaluation methodology","authors":"Attaullah Buriro, Z. Akhtar, B. Crispo, Sandeep Gupta","doi":"10.1109/CCST.2017.8167859","DOIUrl":"https://doi.org/10.1109/CCST.2017.8167859","url":null,"abstract":"Smartphones have become the pervasive personal computing platform. Recent years thus have witnessed exponential growth in research and development for secure and usable authentication schemes for smartphones. Several explicit (e.g., PIN-based) and/or implicit (e.g., biometrics-based) authentication methods have been designed and published in the literature. In fact, some of them have been embedded in commercial mobile products as well. However, the published studies report only the brighter side of the proposed scheme(s), e.g., higher accuracy attained by the proposed mechanism. While other associated operational issues, such as computational overhead, robustness to different environmental conditions/attacks, usability, are intentionally or unintentionally ignored. More specifically, most publicly available frameworks did not discuss or explore any other evaluation criterion, usability and environment-related measures except the accuracy under zero-effort. Thus, their baseline operations usually give a false sense of progress. This paper, therefore, presents some guidelines to researchers for designing, implementation, and evaluating smartphone user authentication methods for a positive impact on future technological developments.","PeriodicalId":371622,"journal":{"name":"2017 International Carnahan Conference on Security Technology (ICCST)","volume":"11 23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116298163","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Design of radio frequency subsystems of a ubiquitous radar in X band X波段泛在雷达射频分系统设计
2017 International Carnahan Conference on Security Technology (ICCST) Pub Date : 2017-10-01 DOI: 10.1109/CCST.2017.8167850
Fernando Ibanez Urzaiz, Alvaro Duque de Quevedo, J. Gismero-Menoyo, A. Asensio-López
{"title":"Design of radio frequency subsystems of a ubiquitous radar in X band","authors":"Fernando Ibanez Urzaiz, Alvaro Duque de Quevedo, J. Gismero-Menoyo, A. Asensio-López","doi":"10.1109/CCST.2017.8167850","DOIUrl":"https://doi.org/10.1109/CCST.2017.8167850","url":null,"abstract":"The purpose of this paper is to present the design of the radiofrequency subsystems of a ubiquitous radar in X band. This document is focused on the design of the antennas and the receiver. Ubiquitous radars are novel systems that illuminate a huge coverage with a transmitting antenna while receiving echoes from targets by a group of antennas pointing to the same area. The main characteristics of the receiving antennas are summarized as well as their design and measurements of radiation patterns. In the last part of the paper, the block diagram of each receiver is shown and measurements are compared with simulations.","PeriodicalId":371622,"journal":{"name":"2017 International Carnahan Conference on Security Technology (ICCST)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129721594","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信