首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   260篇
  免费   0篇
化学   6篇
力学   1篇
数学   89篇
物理学   164篇
  2023年   1篇
  2022年   1篇
  2021年   3篇
  2020年   9篇
  2019年   7篇
  2018年   2篇
  2017年   7篇
  2016年   5篇
  2015年   2篇
  2014年   7篇
  2013年   6篇
  2012年   9篇
  2011年   10篇
  2010年   13篇
  2009年   8篇
  2008年   16篇
  2007年   12篇
  2006年   9篇
  2005年   6篇
  2004年   10篇
  2003年   10篇
  2002年   13篇
  2001年   8篇
  2000年   5篇
  1999年   7篇
  1998年   6篇
  1997年   12篇
  1996年   8篇
  1995年   1篇
  1992年   2篇
  1991年   2篇
  1990年   5篇
  1987年   1篇
  1986年   2篇
  1985年   3篇
  1983年   2篇
  1982年   8篇
  1981年   1篇
  1980年   1篇
  1979年   2篇
  1978年   2篇
  1976年   5篇
  1975年   3篇
  1973年   2篇
  1971年   2篇
  1969年   3篇
  1968年   1篇
排序方式: 共有260条查询结果,搜索用时 15 毫秒
1.
Journal of Experimental and Theoretical Physics - The implementation of quantum cryptography systems significantly differs from idealized models used to prove the secrecy of distributed keys....  相似文献   
2.
Russian Chemical Bulletin - Rhodacarborane [(9-NMe3-7,8-C2B9H10)RhCl2]2 exhibited moderate catalytic activity in the reaction of annulation of arylcarboxylic acids with alkynes, giving naphthalenes...  相似文献   
3.
Theoretical and Mathematical Physics - We construct a quantum kinetic theory of a weakly interacting critical boson gas using the expectation values of products of Heisenberg field operators in the...  相似文献   
4.
Theoretical methods of predicting the deformation characteristics of polymers are considered. The principles of reduced variables are examined. The relation between characteristics functions of polymers is analyzed. A prediction method is considered for polymers; the method is based upon the use of macroscopical mechanical models having a basis in terms of physics.Translated from Zhurnal Prikladnoi Mekhaniki i Tekhnicheskoi Fiziki, No. 2, pp. 147–152, March–April, 1973.  相似文献   
5.
Balygin  K. A.  Kulik  S. P.  Molotkov  S. N. 《JETP Letters》2022,116(2):128-132
JETP Letters - A simple fundamental modification of quantum key distribution protocols has been proposed: it is not required to protect the results of avalanche detectors from an eavesdropper, but...  相似文献   
6.
It has been shown that the coherent quantum cryptography protocol (Coherent One Way) and, correspondingly, fiber optic systems involving this protocol for quantum key distribution, are vulnerable to an attack with repeated measurements and do not guarantee the security of distributed keys in a communication channel with losses. The coherent quantum cryptography system is used in Switzerland as one of the key distribution channels in the framework of the network project SECOQC (SEcure COmmunications based on Quantum Cryptography). A critical attack with repeated measurements was missed when the cryptographic strength of this protocol was analyzed. The critical length of the communication channel has been determined; this is a value above which secure key distribution is certainly impossible. Beginning with the critical length, an eavesdropper knows the entire distributed key, does not introduce errors at the receiver end, and remains undetected. For typical parameters in a real system (the average photon number μ = 0.5 and the quantum efficiency of avalanche detectors η = 0.1, see N. Gisin, G. Ribordy, H. Zbinden, et al., arXiv:quant-ph/0411022 and D. Stucki, C. Barreiro, S. Fasel, et al., arXiv:quant-ph/08095264), the security of keys cannot be guaranteed even for a communication channel whose length is as small as wished.  相似文献   
7.
Theoretical and Mathematical Physics - In papers devoted to superfluidity, the generally accepted statement that the dynamics of the corresponding phase transition is described by the stochastic...  相似文献   
8.
9.
In this work wave propagation processes are investigated in media obtained by averaging periodic layered systems with fluid, elastic-fluid, and elastic with contact-slippage conditions on the boundaries.Translated from Zapiski Nauchnykh Seminarov Leningradskogo Otdeleniya Matematicheskogo Instituta im. V. A. Steklova AN SSSR, Vol. 140, pp. 105–122, 1984.  相似文献   
10.
Under rather general assumptions about the properties of a quantum channel with noise, a quantum protocol providing implementation of secret bit commitment with the probability as close to unity as is wished is proposed.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号