全文获取类型
收费全文 | 455篇 |
免费 | 169篇 |
国内免费 | 12篇 |
专业分类
化学 | 97篇 |
晶体学 | 3篇 |
力学 | 26篇 |
综合类 | 33篇 |
数学 | 104篇 |
物理学 | 373篇 |
出版年
2024年 | 1篇 |
2023年 | 10篇 |
2022年 | 23篇 |
2021年 | 49篇 |
2020年 | 31篇 |
2019年 | 22篇 |
2018年 | 15篇 |
2017年 | 21篇 |
2016年 | 22篇 |
2015年 | 22篇 |
2014年 | 44篇 |
2013年 | 37篇 |
2012年 | 22篇 |
2011年 | 35篇 |
2010年 | 37篇 |
2009年 | 31篇 |
2008年 | 34篇 |
2007年 | 40篇 |
2006年 | 25篇 |
2005年 | 32篇 |
2004年 | 15篇 |
2003年 | 12篇 |
2002年 | 14篇 |
2001年 | 5篇 |
2000年 | 6篇 |
1999年 | 6篇 |
1998年 | 8篇 |
1997年 | 6篇 |
1996年 | 2篇 |
1994年 | 1篇 |
1992年 | 1篇 |
1991年 | 1篇 |
1990年 | 1篇 |
1989年 | 2篇 |
1986年 | 1篇 |
1980年 | 1篇 |
1979年 | 1篇 |
排序方式: 共有636条查询结果,搜索用时 15 毫秒
1.
Due to avoiding the inherent escrow of identity-based cryptography and yet not requiring certificates to guarantee the authenticity of public keys, certificateless public key cryptography has received a significant attention. Due to various applications of bilinear pairings in cryptography, numerous pairing-based encryption schemes, signature schemes, and other cryptographic primitives have been proposed. In this paper, a new certificateless signature scheme based on bilinear pairings is presented. The signing algorithm of the proposed scheme is very simple and does not require any pairing computation. Combining our signature scheme with certificateless public key cryptography yields a complete solution of certificateless public key system. As an application of the proposed signature scheme, a certificateless proxy signature scheme is also presented. We analyze both schemes from security point of view.__________Published in Lietuvos Matematikos Rinkinys, Vol. 45, No. 1, pp. 95–103, January–March, 2005. 相似文献
2.
工程施工中运输网络优化方案 总被引:5,自引:0,他引:5
施工工地运输方案的优化设计可以归结为 :按施工期要求设计运输线路或验证已有线路通行能力 ,计算总线路中影响提高流量的关键路段 ,取得最小费用最大流 .本文运用图论理论这一数学工具把实际问题抽象为有向网络 ,进而建立数学模型 .此方法理论上严密 ,解题步聚直观清晰 ,对水利、公路、水路、铁路等其它运输系统有普遍意义 . 相似文献
3.
本文根据国家关键技术管理工作的特点,本着提高决策质量,满足用户要求的原则,分析和设计国家关键技术管理计算机系统,为高层次宏观决策提供丰富的信息支持。 相似文献
4.
Quantum Key Distribution Using Four-Qubit W State 总被引:3,自引:0,他引:3
CAO Hai-Jing SONG He-Shan 《理论物理通讯》2006,46(1):65-68
A new theoretical quantum key distribution scheme based on entanglement swapping is proposed, where four-qubit symmetric W state functions as quantum channel. It is shown that two legitimate users can secretly share a series of key bits by using Bell-state measurements and classical communication. 相似文献
5.
This paper concerns methods by which a trusted authority can distribute keys and/or broadcast a message over a network, so that each member of a privileged subset of users can compute a specified key or decrypt the broadcast message. Moreover, this is done in such a way that no coalition is able to recover any information on a key or broadcast message they are not supposed to know. The problems are studied using the tools of information theory, so the security provided is unconditional (i.e., not based on any computational assumption).In a recent paper st95a, Stinson described a method of constructing key predistribution schemes by combining Mitchell-Piper key distribution patterns with resilient functions; and also presented a construction method for broadcast encryption schemes that combines Fiat-Naor key predistribution schemes with ideal secret sharing schemes. In this paper, we further pursue these two themes, providing several nice applications of these techniques by using combinatorial structures such as orthogonal arrays, perpendicular arrays, Steiner systems and universal hash families. 相似文献
6.
朱扬勇 《新疆大学学报(理工版)》1991,8(3):44-45
本文给出了关系数据库模式中求解关键字的一个算法。算法很简洁并且对于[1]定义的一大类问题,执行时间是多项式级的。 相似文献
7.
Construction of the side chain of brassrnolide and its related compounds by the aldolreaction of lithofuran with 22-steroidal aldehyde obtained from hyodeoxycholic acid isdescribed. A key intermediate, 22R, 23R-γ-hydroxy-α, β-unsaturated lactone (16) wassynthesized. 相似文献
8.
Autoverification is a process in which computer software will automatically evaluate laboratory test results, verify result integrity, and then release the results to the hospital interface without any technologist intervention. Autoverify release criteria are user defined and can be customized. The process of developing, implementing, and monitoring autoverify is achievable for most test results in laboratory medicine. The use of autoverification will improve result quality, increase revenue, and create faster turn-around times. All of this put together will ultimately lead to improved customer satisfaction. Computers and autoverification are survival tools in the competitive market of laboratory diagnostics services.Presented at the 8th Conference on Quality in the Spotlight, 17–18 March 2003, Antwerp, Belgium 相似文献
9.
10.