Asia CCS '22 : proceedings of the 2022 ACM Asia Conference on Computer and Communications Security : May 30-June 3, 2022, Nagasaki, Japan. ACM Asia Conference on Computer and Communications Security (17th : 2022 : Nagasaki-shi, Japan ; ...最新文献

筛选
英文 中文
Enabling Attribute-Based Access Control in Linux Kernel. 在Linux内核中启用基于属性的访问控制。
H O Sai Varshith, Jaideep Vaidya, Shamik Sural, Vijayalakshmi Atluri
{"title":"Enabling Attribute-Based Access Control in Linux Kernel.","authors":"H O Sai Varshith,&nbsp;Jaideep Vaidya,&nbsp;Shamik Sural,&nbsp;Vijayalakshmi Atluri","doi":"10.1145/3488932.3527293","DOIUrl":"https://doi.org/10.1145/3488932.3527293","url":null,"abstract":"<p><p>Linux has built-in security features based on discretionary access control that can be enhanced using the Linux Security Module (LSM) framework. However, so far there has been no reported work on strengthening Linux with Attribute-Based Access Control (ABAC), which is gaining in popularity in recent years due to its flexibility and dynamic nature. In this paper, a method for enabling ABAC for Linux file system objects using LSM is proposed. We report initial experimental results and also share our public repository links for integrating ABAC in any Linux installation.</p>","PeriodicalId":72308,"journal":{"name":"Asia CCS '22 : proceedings of the 2022 ACM Asia Conference on Computer and Communications Security : May 30-June 3, 2022, Nagasaki, Japan. ACM Asia Conference on Computer and Communications Security (17th : 2022 : Nagasaki-shi, Japan ; ...","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9825047/pdf/nihms-1854493.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"9535515","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The functions of heraldic symbols in the English fiction 纹章符号在英国小说中的作用
I. Moiseiuk
{"title":"The functions of heraldic symbols in the English fiction","authors":"I. Moiseiuk","doi":"10.26565/2218-2926-2021-22-03","DOIUrl":"https://doi.org/10.26565/2218-2926-2021-22-03","url":null,"abstract":"The article considers the main functions performed by heraldic symbols due to their verbalization in blazons as descriptions of coats of arms by a specific set of language constructs. Heraldic symbols as the quintessence of culture are analyzed in the communicative-functional aspect. There are some special characteristics of heraldic symbolic units, namely, their multifunctional orientation, the possibility of multiple interpretations, the presence of a nomination mechanism, and others. The mediative and mnemonic functions of symbols, taken from the works of Lotman, are manifested in the heraldic symbols of fiction as one of the mechanisms of cultural memory, therefore, the symbol is a mediator of the semiosis spheres. The list of functions is supplemented by the consideration of the social dimension, because heraldic symbols are potentiated in the society, therefore, the essence of the identification-integrative and adaptive-regulatory functions of heraldic symbolism is revealed. The concepts of multimodal imagery and synesthesia effect, which are embodied in the interaction of verbal and nonverbal symbols, are involved in the analysis of the blazons on the material of English fiction. The theme of symbols functioning is supplemented by the classification of the main functions and subfunctions proposed by the author. The focus of the study is also the identification function, resulting in an emphasis on the role of a special heraldic language in the expression of the personality. Taking into account the types of coats of arms, the article considers the coding function in the punning and allusive coats of arms, as well as in the heraldic lexemes borrowed from other languages. The cross-cutting idea of the article is revealed through the interpretation of heraldic symbols in their functioning in the works of English fiction and poetry and summarized in the definition of the symbol not only as a linguistic unit, but also as a semiotic phenomenon of culture.","PeriodicalId":72308,"journal":{"name":"Asia CCS '22 : proceedings of the 2022 ACM Asia Conference on Computer and Communications Security : May 30-June 3, 2022, Nagasaki, Japan. ACM Asia Conference on Computer and Communications Security (17th : 2022 : Nagasaki-shi, Japan ; ...","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-08-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82051886","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Impoliteness in parliamentary discourse: a cognitive-pragmatic and sociocultural approach 议会话语中的不礼貌:一个认知-语用和社会文化的方法
I. Shevchenko, D. Alexandrova, Volodymyr Gutorov
{"title":"Impoliteness in parliamentary discourse: a cognitive-pragmatic and sociocultural approach","authors":"I. Shevchenko, D. Alexandrova, Volodymyr Gutorov","doi":"10.26565/2218-2926-2021-22-05","DOIUrl":"https://doi.org/10.26565/2218-2926-2021-22-05","url":null,"abstract":"This article focuses on the use of impoliteness strategies in the discourse of American, Bulgarian, Polish, and Ukrainian parliaments. Our research of impolite rhetoric, also known as unparliamentary language, is located on the intersection of cognitive pragmatics, cultural linguistics, and discourse analysis. We use an integrative framework, in which the pragmatics of impoliteness is underpinned by the cognitive model of the concept of impoliteness. We offer a description of impoliteness strategies in parliamentary discourse, single out the leading strategy of devaluation of the opponent, and define the stereotypical for each parliament verbal means of the strategy of devaluation and its tactics: criticism and belittlement of one’s merits and importance. Their verbal markers are lexicalized and syntactic units bearing the meaning of negative characterization, disrespect, mockery, sarcasm. We hypothesize that the variation of impoliteness strategies is different parliamentary discourses corresponds to linguistic, pragmatic, and sociocultural dissimilarities, and provide support for this through an empirical study. Linguistically, discursive means of devaluation in the American, Bulgarian, Polish, and Ukrainian parliaments are context free and context dependent, and their ratio varies. In all these parliamentary discourses, the lexicalized markers of impoliteness come from common mental source domains: negative evaluation, legal offence, democracy, deception, hostilities, their variation is due to corresponding construals of the world. Culturally, we claim that the form and content of impoliteness strategies is indirectly connected with a low-context culture in the USA as opposed to a high-context type of Slavic cultures. In the former, devaluation of opponents is mostly reached by lexicalized markers with inherent negative meaning; and in the latter, by syntactic context-dependent means. Pragmatically, the specific properties of impoliteness strategies in the four parliamentary discourses reveal their relation to the dominant politeness principles, which are negatively oriented in modern English and positively in Bulgarian, Polish, and Ukrainian.","PeriodicalId":72308,"journal":{"name":"Asia CCS '22 : proceedings of the 2022 ACM Asia Conference on Computer and Communications Security : May 30-June 3, 2022, Nagasaki, Japan. ACM Asia Conference on Computer and Communications Security (17th : 2022 : Nagasaki-shi, Japan ; ...","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-08-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77861660","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Verbal, visual, and verbal-visual puns in translation: cognitive multimodal analysis 翻译中的言语、视觉和言语-视觉双关语:认知多模态分析
Liudmila Kovalenko, A. Martynyuk
{"title":"Verbal, visual, and verbal-visual puns in translation: cognitive multimodal analysis","authors":"Liudmila Kovalenko, A. Martynyuk","doi":"10.26565/2218-2926-2021-22-02","DOIUrl":"https://doi.org/10.26565/2218-2926-2021-22-02","url":null,"abstract":"This paper presents results of cognitive multimodal analysis of English to Ukrainian and English to Russian translations of verbal, visual and verbal-visual puns found in the American animated tragicomedy sitcom “BoJack Horseman”. We have found that translation of verbal puns presupposes overcoming constraints caused by linguacultural specificity of the pun-producing source-text linguistic expressions (idioms and/or allusions). Translation of visual puns entails constructing an illuminating verbal context, which facilitates interpretation of the images. Translation of verbal-visual puns, both those in which the incongruous conceptual structures are cued verbally, and the image dubs the text, and those in which one of the incongruent structures is cued verbally and the other is triggered visually, demands reconciling the image with the text on top of coping with linguacultural specificity. We have revealed that to render the analyzed puns the translators resort to three basic translation procedures: retention, reduction, and replacement. Literal translation resulting in retention of a pun leads to foreignization of the target text unless the recipients can be expected to infer the pun due to the impact of cultural globalization. In all analyzed cases, translators failed to retain pun meanings cued by the image. Reduction and replacement result in complete (causing a loss of a pun) compulsory (imposed by linguacultural constraints) domestication. Reduction instantiates as choosing a target-language expression that cues only one of the two incongruent conceptual structures engaged in a pun and replacement presupposes using a target-language expression that compensates for the loss of a pun by creating a different humorous stimulus. In a multimodal/multimedial context, a target-text verbal expression can be replaced by a verbal-visual one.","PeriodicalId":72308,"journal":{"name":"Asia CCS '22 : proceedings of the 2022 ACM Asia Conference on Computer and Communications Security : May 30-June 3, 2022, Nagasaki, Japan. ACM Asia Conference on Computer and Communications Security (17th : 2022 : Nagasaki-shi, Japan ; ...","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-08-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76262406","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Possible worlds of a literary text character: a cognitive and quantitative linguistic approach 文学文本人物的可能世界:认知与定量语言学方法
Dmytro Pavkin
{"title":"Possible worlds of a literary text character: a cognitive and quantitative linguistic approach","authors":"Dmytro Pavkin","doi":"10.26565/2218-2926-2021-22-04","DOIUrl":"https://doi.org/10.26565/2218-2926-2021-22-04","url":null,"abstract":"The article aims to forward a model for analyzing the evaluative component of controversial literary characters. This model presupposes the application of the basic tenets of the possible worlds theory to the analysis of a fiction text, combining it with the methodology of cognitive and quantitative linguistics. To exemplify the employment of the developed model, the image of Louis XI, the King of France, depicted by W. Scott in his novel Quentin Durward, was analyzed. Portrayed as an astute politician, this protagonist puts on different guises and plays numerous roles while the plot unravels, trying to achieve his goals and influence the people around him. Such roles are viewed in the article as possible worlds of Louis XI. In these worlds, he is described through various positive and negative characteristics, which are considered predicates of basic propositional schemas featuring in semantics of lingual networks. To fathom the importance and ubiquity of the characteristics, two indices used in quantitative linguistics (coverage rate and mean frequency) were employed. Such a complex approach enabled to reveal the existence of 15 possible worlds of Louis XI in the novel. Two-thirds of them are primary possible worlds created via direct description of the image by the author, and one-third is secondary possible worlds, where the King is depicted indirectly by presenting the vantage point of other characters who appraise Louis and express their attitude to him. The most important characteristics of Louis emphasized by the author and featuring in the maximum number of his possible world create a portrait of a skillful medieval monarch. Being sly, he hypocritically conceals his true cruel and mercenary aspirations and generally succeeds in presenting himself to others as a devout Christian and wise ruler acting for the benefit of his subjects, which is vindicated by the prevalence of his positively charged descriptions. Thus, the image created by W. Scott in his novel lives up to the reputation of Universal Spider—the symptomatic nickname that this historical figure earned from his contemporaries.","PeriodicalId":72308,"journal":{"name":"Asia CCS '22 : proceedings of the 2022 ACM Asia Conference on Computer and Communications Security : May 30-June 3, 2022, Nagasaki, Japan. ACM Asia Conference on Computer and Communications Security (17th : 2022 : Nagasaki-shi, Japan ; ...","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-08-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82984261","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Storytelling in advertising and branding 在广告和品牌中讲故事
Alla Belova
{"title":"Storytelling in advertising and branding","authors":"Alla Belova","doi":"10.26565/2218-2926-2021-22-01","DOIUrl":"https://doi.org/10.26565/2218-2926-2021-22-01","url":null,"abstract":"Information communication technologies accelerated numerous trends in the world including the shift to online communication and further content digitalization. Technological innovations reverberate throughout complex social and demographic trends which make a significant impact on business, international companies including. The article focuses on linguistic analysis of the current changes in advertising and branding, mainly in the fashion industry. COVID-19 pandemic with online communication and remote work contributed to further transformation of choice, preferences, and options as well as to popularity of social media as an instrument of information search, as the environment for communication and sharing opinions. Lockdowns and quarantines during COVID-19 pandemic, lack of direct contact with clients entailed the shift to online marketing and advertising. Looking for effective online marketing instruments some companies select storytelling as a basis for their videos. Underpinned theoretically by multimodal discourse analysis and narrative studies, this paper shows how storytelling with its appeal to emotions and memorability potential is becoming a noticeable marketing trend and advertising strategy against the background of current radical technological changes in the information abundant world. Companies manufacturing lux products began to diversify marketing strategies and generate multimodal narrative – a string of stories about the brand, its founders, technologies they use. COVID-19 pandemic accelerated the shift to multimodal videos. During COVID-19 pandemic, fashion houses created marketing masterpieces to attract attention to new collections. They replaced traditional physical shows and set a new perspective for online fashion shows. These short films telling brand stories become chapters of a brand’s lookbook available in social media.","PeriodicalId":72308,"journal":{"name":"Asia CCS '22 : proceedings of the 2022 ACM Asia Conference on Computer and Communications Security : May 30-June 3, 2022, Nagasaki, Japan. ACM Asia Conference on Computer and Communications Security (17th : 2022 : Nagasaki-shi, Japan ; ...","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-08-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84100741","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, Taipei, Taiwan, October 5-9, 2020 第15届ACM亚洲计算机与通信安全会议,台北,台湾,2020年10月5日至9日
{"title":"ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, Taipei, Taiwan, October 5-9, 2020","authors":"","doi":"10.1145/3320269","DOIUrl":"https://doi.org/10.1145/3320269","url":null,"abstract":"","PeriodicalId":72308,"journal":{"name":"Asia CCS '22 : proceedings of the 2022 ACM Asia Conference on Computer and Communications Security : May 30-June 3, 2022, Nagasaki, Japan. ACM Asia Conference on Computer and Communications Security (17th : 2022 : Nagasaki-shi, Japan ; ...","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74046958","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Outsourced private set intersection using homomorphic encryption 外包私有集交集使用同态加密
F. Kerschbaum
{"title":"Outsourced private set intersection using homomorphic encryption","authors":"F. Kerschbaum","doi":"10.1145/2414456.2414506","DOIUrl":"https://doi.org/10.1145/2414456.2414506","url":null,"abstract":"Private set intersection enables two parties -- a client and a server -- to compute the intersection of their respective sets without disclosing anything else. It is a fundamental operation -- equivalent to a secure, distributed database join -- and has many applications particularly in privacy-preserving law enforcement. In this paper we present a novel protocol that has linear complexity, is secure in the malicious model without random oracles, is client set size-independent and efficient. Furthermore, the computation of the intersection can be outsourced to an oblivious service provider, as in secure cloud computing. We leverage a completely novel construction for computing the intersection using Bloom filter and homomorphic encryption. For outsourcing we require and introduce a new homomorphic encryption scheme which may be of independent interest.","PeriodicalId":72308,"journal":{"name":"Asia CCS '22 : proceedings of the 2022 ACM Asia Conference on Computer and Communications Security : May 30-June 3, 2022, Nagasaki, Japan. ACM Asia Conference on Computer and Communications Security (17th : 2022 : Nagasaki-shi, Japan ; ...","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-05-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91503885","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 132
Carving secure wi-fi zones with defensive jamming 用防御性干扰开辟安全wi-fi区域
Y. Kim, P. Tague, Heejo Lee, Hyogon Kim
{"title":"Carving secure wi-fi zones with defensive jamming","authors":"Y. Kim, P. Tague, Heejo Lee, Hyogon Kim","doi":"10.1145/2414456.2414487","DOIUrl":"https://doi.org/10.1145/2414456.2414487","url":null,"abstract":"With rampant deployment of wireless technologies such as WLAN, information leakage is increasingly becoming a threat for its serious adopters such as enterprises. Research on antidotes has been mainly focused on logical measures such as authentication protocols and secure channels, but an inside collaborator can readily circumvent such defenses and wirelessly divert the classified information to a conniver outside. In this paper, we propose a novel approach to the problem that forges a walled wireless coverage, a secure Wi-Fi zone in particular. Inspired by the fact that jamming as an attack is inherently difficult to defeat, we turn the table and use it as a defensive weapon to fend off the covert illegal access from outside. To validate the proposed approach, we conduct extensive outdoor experiments with the IEEE 802.11g Wi-Fi adapters. The measurements show that the forged secure zones match well with the model prediction and that the defensive jamming approach can indeed be used to protect wireless networks against information leakage. Lastly, we propose the algorithms to configure defensive jammers in arbitrary geometry.","PeriodicalId":72308,"journal":{"name":"Asia CCS '22 : proceedings of the 2022 ACM Asia Conference on Computer and Communications Security : May 30-June 3, 2022, Nagasaki, Japan. ACM Asia Conference on Computer and Communications Security (17th : 2022 : Nagasaki-shi, Japan ; ...","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-05-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81979694","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 28
An identity authentication protocol in online social networks 在线社交网络中的身份认证协议
Lingjun Li, Xinxin Zhao, G. Xue
{"title":"An identity authentication protocol in online social networks","authors":"Lingjun Li, Xinxin Zhao, G. Xue","doi":"10.1145/2414456.2414471","DOIUrl":"https://doi.org/10.1145/2414456.2414471","url":null,"abstract":"Recent success of online social networks (OSNs) motivates the study of security issues in OSNs. A fundamental but challenging security issue in OSNs is to authenticate a friend's real identity. A solution to this issue will benefit a number of OSN security protocols. Existing solutions require users securely obtain some secret information from their friends before authentication takes place, which is not always possible in OSNs. In this paper, we propose a new authenticated key exchange protocol based on the exclusive secrets shared between friends. It provides identity authentication and key exchange in a plain setting, i.e., users do not need to securely exchange or distribute any information beforehand. The protocol is designed to work with low-entropy input information, because human beings are not good at dealing with a large amount of information. Another advantage of our protocol is its tolerance of input errors considering human error is always a possibility. We prove the security of the protocol in the universal composability (UC) framework and demonstrate its efficiency.","PeriodicalId":72308,"journal":{"name":"Asia CCS '22 : proceedings of the 2022 ACM Asia Conference on Computer and Communications Security : May 30-June 3, 2022, Nagasaki, Japan. ACM Asia Conference on Computer and Communications Security (17th : 2022 : Nagasaki-shi, Japan ; ...","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-05-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82527014","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信