全文获取类型
收费全文 | 247篇 |
免费 | 46篇 |
国内免费 | 14篇 |
专业分类
化学 | 70篇 |
晶体学 | 2篇 |
力学 | 61篇 |
综合类 | 16篇 |
数学 | 44篇 |
物理学 | 114篇 |
出版年
2024年 | 1篇 |
2023年 | 4篇 |
2022年 | 6篇 |
2021年 | 10篇 |
2020年 | 9篇 |
2019年 | 4篇 |
2018年 | 6篇 |
2017年 | 6篇 |
2016年 | 12篇 |
2015年 | 9篇 |
2014年 | 29篇 |
2013年 | 22篇 |
2012年 | 19篇 |
2011年 | 15篇 |
2010年 | 13篇 |
2009年 | 11篇 |
2008年 | 19篇 |
2007年 | 22篇 |
2006年 | 13篇 |
2005年 | 12篇 |
2004年 | 18篇 |
2003年 | 4篇 |
2002年 | 7篇 |
2001年 | 1篇 |
2000年 | 6篇 |
1999年 | 5篇 |
1998年 | 1篇 |
1997年 | 4篇 |
1996年 | 4篇 |
1995年 | 3篇 |
1994年 | 2篇 |
1993年 | 2篇 |
1992年 | 3篇 |
1991年 | 2篇 |
1984年 | 1篇 |
1979年 | 1篇 |
1977年 | 1篇 |
排序方式: 共有307条查询结果,搜索用时 31 毫秒
91.
Public-Key Cryptography (PKC) based on multivariate quadratic equations is one of the most promising alternatives for classical PKC after the eventual coming of quantum computers. Recently, Shen and Tang proposed a new MQ-signature scheme, RGB, based on three types of variables, Red(r), Green(g) and Blue(b). They claimed that signing for RGB is faster than that of UOV and Rainbow. At ACISP 2016, Tang et al. implemented RGB on S5PV210 and MT6582 microprocessors at 64, 80, 96, 118 and 128-bit security levels for practical use. Their results are much more efficient than other MQ-signature schemes, so RGB is very appealing for resource-limited devices. We show that RGB with their suggested parameters at 64, 80, 96, 118 and 128 security levels are entirely broken by key recovery attacks using good keys. From a practical point of view, we are able to break their parameters at 64, 80, 96, 118 and 128 security levels in less than 0.48 seconds, 1.7 seconds, 90.68 seconds, 11 minutes and 6.82 hours, respectively. Consequently, we show that signing and the key sizes for RGB with secure parameter sets are much slower and larger than those of UOV and Rainbow. 相似文献
92.
We propose a unidimensional two-way continuous-variable quantum key distribution protocol with coherent states, where the sender modulates a single quadrature of the coherent states rather than both quadratures to simplify the structure of a two-way system. Security analysis is performed with a general attack strategy, known as two-mode attack, which helps to reduce limitations in the analysis. The performance of the protocol under all accessible two-mode attacks at fixed distance is illustrated. Further, two typical two-mode attack strategies are obtained from it, which are one-mode attack strategy and optimal two-mode attack strategy. Between them, the one-mode attack is the simplest form of the two-mode attack, while the optimal two-mode attack is the most complicated one. Simulations show that though the system is simplified, the performance of the two-way protocol with unidimensional modulation is still comparable to that of the counterpart with Gaussian modulation even against the optimal two-mode attack when Eve’s ability is maximized. Thus, the proposed protocol simplifies the two-way system while guaranteeing its performance to a certain extent. Especially in a practical system with short transmission distance and high excess noise, the protocol has a good application prospect. 相似文献
93.
联合直接攻击弹药精确制导技术分析 总被引:3,自引:0,他引:3
从技术分析的角度对联合直接攻击弹药(JDAM)的武器制导系统进行了研究。安装JDAM制导控制装置的弹药武器,通过GPS/INS组合制导和尾翼调节,控制武器精确命中目标。在对JDAM系统组成和精度分析的基础上,详细讨论了JDAM系统的卡尔曼滤波器、捷联惯性导航技术、传递对准和GPS辅助惯性制导等技术。对设计中遇到主要的技术难点和相应的解决途径也进行了分析。 相似文献
94.
有序态Fe3Al合金在水环境中的磨粒磨损行为 总被引:1,自引:0,他引:1
研究了不同载荷下含Cr的B2和DO3有序态Fe3Al合金在水中的磨粒磨损行为。采用扫描电镜分析了合金的磨损表面形貌和磨屑形貌。二次离子质谱分析结果表明:在水环境磨损条件下,随着载荷的增加,进入Fe3Al合金表层的氢浓度升高,合金表层的氢损伤加剧。在高载荷下由机械磨损所引起的材料流失仍占主导地位,相同载荷下B2有序态Fe3Al合金的磨损质量损失比DO3有序态Fe3Al合金低。 相似文献
95.
96.
97.
提出了一个多用户量子信令树型传输系统,并详细阐述了信令的传输过程.研究了系统中信令受到特洛伊木马攻击的损伤模型及其修复的必要性.将量子密钥分发的思想引入量子信令安全的直接通信中,分析了采用非正交量子态,以克服特洛伊木马攻击的问题,从而提高了信令传输的安全性.对多用户量子信令树型传输系统进行改进,提出了新的广义的多用户量子信令树型拓扑传输模型.研究结果表明,本文所提出的对多用户信令攻击的修复策略可有效地防止特洛伊木马攻击,从而保证信令传输过程安全有效的进行. 相似文献
98.
Dr. Gavin S. Heverly‐Coulson Prof. Russell J. Boyd Prof. Otilia Mó Prof. Manuel Yáñez 《Chemistry (Weinheim an der Bergstrasse, Germany)》2013,19(11):3629-3638
The reactivity of disulfide and diselenide derivatives towards F? and CN? nucleophiles has been investigated by means of B3PW91/6‐311+G(2df,p) calculations. This theoretical survey shows that these processes, in contrast with the generally accepted view of disulfide and diselenide linkages, do not always lead to S? S or Se? Se bond cleavage. In fact, S? S or Se? Se bond fission is the most favorable process only when the substituents attached to the S or the Se atoms are not very electronegative. Highly electronegative substituents (X) strongly favor S? X bond fission. This significant difference in the observed reactivity patterns is directly related to the change in the nature of the LUMO orbital of the disulfide or diselenide derivative as the electronegativity of the substituents increases. For weakly electronegative substituents, the LUMO is a σ‐type S? S (or Se? Se) antibonding orbital, but as the electronegativity of the substituents increases the π‐type S? X antibonding orbital stabilizes and becomes the LUMO. The observed reactivity also changes with the nature of the nucleophile and with the S or Se atom that undergoes the nucleophilic attack in asymmetric disulfides and diselenides. The activation strain model provides interesting insights into these processes. There are significant similarities between the reactivity of disulfides and diselenides, although some dissimilarities are also observed, usually related to the different interaction energies between the fragments produced in the fragmentation process. 相似文献
99.
In order to increase the accuracy of turbulence field reconstruction, this paper combines experimental observation and numerical simulation to develop and establish a data assimilation framework, and apply it to the study of S809 low-speed and high-angle airfoil flow. The method is based on the ensemble transform Kalman filter(ETKF) algorithm, which improves the disturbance strategy of the ensemble members and enhances the richness of the initial members by screening high flow field sensitivity ... 相似文献
100.
逆同余发生器的密码分析 总被引:1,自引:0,他引:1
使用格中的最短向量对未知向量进行逼近的方法,证明了在已知乘子a和模数p的条件下,若连续的wi满足|ui-wi|是一个很小的数时,在多项式时间内可以恢复出逆同余发生器的移位B. 本文的结论表明将逆同余发生器直接应用于密码学必须十分慎重. 相似文献