全文获取类型
收费全文 | 321篇 |
免费 | 95篇 |
国内免费 | 1篇 |
专业分类
化学 | 9篇 |
力学 | 1篇 |
综合类 | 12篇 |
数学 | 47篇 |
物理学 | 348篇 |
出版年
2024年 | 2篇 |
2023年 | 4篇 |
2022年 | 22篇 |
2021年 | 28篇 |
2020年 | 17篇 |
2019年 | 6篇 |
2018年 | 3篇 |
2017年 | 32篇 |
2016年 | 14篇 |
2015年 | 17篇 |
2014年 | 39篇 |
2013年 | 28篇 |
2012年 | 22篇 |
2011年 | 31篇 |
2010年 | 23篇 |
2009年 | 24篇 |
2008年 | 25篇 |
2007年 | 16篇 |
2006年 | 13篇 |
2005年 | 13篇 |
2004年 | 9篇 |
2003年 | 10篇 |
2002年 | 2篇 |
2001年 | 4篇 |
2000年 | 1篇 |
1999年 | 1篇 |
1998年 | 6篇 |
1997年 | 4篇 |
1992年 | 1篇 |
排序方式: 共有417条查询结果,搜索用时 15 毫秒
371.
Let N and α be integers larger than 1. Define an orbit to be the collection of residues in
generated byiteratively applying
mod N to an element
which eventually maps back to itself.An orbit's length is the number of distinct residues in the orbit. When N isa large
bicomposite integer, such as is commonly used in many cryptographicapplications, and when certain prime factorizations related
to N are known,all orbit lengths and the number of orbits of each possible length can beefficiently computed using the results
presented. If the required integerfactorizations are only partially known, the risk that a randomly selectedperiodic element
might produce an orbit shorter than some (typically large)divisor of
can be bounded. The information needed to producesuch a bound is fully available when the prime factors of N are generatedusing
the prime generation algorithm defined in Maurer maur. Resultspresented can assist in choosing wisely a modulus N for the
Blum, Blum, andShub pseudo-random bit generator. If N is a bicomposite RSA modulus, theanalysis shows how to quantify the
risk posed by an iterated encryptionattack. 相似文献
372.
Double images hiding based on optical interference 总被引:1,自引:0,他引:1
Bo Wang 《Optics Communications》2009,282(17):3439-691
A double images hiding technology based on optical interference is proposed. The images are hiding into two computer generated phase only masks which are located at the determined positions. Two beams propagate through the masks and interfere at the preset positions. The desired images will appear at the preset positions. The positions coordinates and wavelength can also be used as encoding parameters. Computer simulations show the validity of this new method. 相似文献
373.
For efficiency and security of image transmission and storage, the joint image compression and encryption method that performs compression and encryption in a single step is a promising solution due to better security. Moreover, on some important occasions, it is necessary to save images in high quality by lossless compression. Thus, a joint lossless image compression and encryption scheme based on a context-based adaptive lossless image codec (CALIC) and hyperchaotic system is proposed to achieve lossless image encryption and compression simultaneously. Making use of the characteristics of CALIC, four encryption locations are designed to realize joint image compression and encryption: encryption for the predicted values of pixels based on gradient-adjusted prediction (GAP), encryption for the final prediction error, encryption for two lines of pixel values needed by prediction mode and encryption for the entropy coding file. Moreover, a new four-dimensional hyperchaotic system and plaintext-related encryption based on table lookup are all used to enhance the security. The security tests show information entropy, correlation and key sensitivity of the proposed methods reach 7.997, 0.01 and 0.4998, respectively. This indicates that the proposed methods have good security. Meanwhile, compared to original CALIC without security, the proposed methods increase the security and reduce the compression ratio by only 6.3%. The test results indicate that the proposed methods have high security and good lossless compression performance. 相似文献
374.
A robust image encryption method by using the integral imaging and pixel scrambling (PS) techniques is proposed. In this method, pixels of the cover image are scrambled with the PS technique and elemental images for this scrambled image are picked up through a lenslet array. Subsequently, an encrypted image is obtained by scrambling these picked-up elemental images. Since this encrypted image has the hologram-like property of data redundancy resulted from the integral imaging scheme, while it can as well be decoded by multiple keys such as the orders of pixel scrambling and the pickup conditions of the elemental images, its security against the various attacks could be dramatically improved. Good experimental results also confirm that the proposed method could provide more enhanced robustness against data loss and Gaussian noises compared to the conventional methods. 相似文献
375.
A new image encryption approach is proposed. First, a sort transformation based on nonlinear chaotic algorithm is used to shuffle the positions of image pixels. Then the states of hyper-chaos are used to change the grey values of the shuffled image according to the changed chaotic values of the same position between the above nonlinear chaotic sequence and the sorted chaotic sequence. The experimental results demonstrate that the image encryption scheme based on a shuffling map shows advantages of large key space and high-level security. Compared with some encryption algorithms, the suggested encryption scheme is more secure. 相似文献
376.
Luciano Zunino Miguel C. Soriano Alejandra Figliola Darío G. Prez Mario Garavaglia Claudio R. Mirasso Osvaldo A. Rosso 《Optics Communications》2009,282(23):4587-4594
From the estimation of the Hurst exponent and the multifractality degree we discriminate the security levels of two typical encoding schemes usually applied in chaos-based communication systems. We also analyze the effects that the sampling period and the message amplitude have on the goodness of these techniques. We compare our results with those obtained by considering an information theory approach [O.A. Rosso, R. Vicente, C.R. Mirasso, Phys. Lett. A 372 (2007) 1018]. The Hurst exponent seems to be a sensitive and powerful tool for discriminating the presence of a message embedded in a chaotic carrier. 相似文献
377.
Narendra Singh 《Optics Communications》2009,282(6):1104-5407
We propose a new method for image encryption using Hartley transform with jigsaw transform and logistic map. Logistic map has been used to generate the random intensity mask which is known as chaotic random intensity mask. The problem of bare decryption with Hartley transform has been solved by using the jigsaw transform. In the proposed technique, the image is encrypted using two methods in which the second method is the extension of the first method. In the first method, the image is encrypted using Hartley transform and jigsaw transform. In the second method, the image is encrypted using Hartley transform, jigsaw transform and logistic map. The mean square errors and the signal to noise ratio have been calculated. Robustness of the technique in terms of blind decryption and the algorithmic complexity has been evaluated. The optical implementation has been proposed. The computer simulations are presented to verify the validity of the proposed technique. 相似文献
378.
Broadcasting is the process of information dissemination in a communication network in which a message, originated by one member, is transmitted to all members of the network. A broadcast graph is a graph which permits broadcasting from any originator in minimum time. The broadcast function B(n) is the minimum number of edges in any broadcast graph on n vertices. In this paper, we construct a broadcast graph on 26 vertices with 42 edges to prove B(26) = 42. 相似文献
379.
RSA公开密钥密码体制及其安全性分析 总被引:4,自引:0,他引:4
朱有根 《宁波大学学报(理工版)》2001,14(2):48-50
介绍了公开密钥密码技术、RSA加密算法及密钥产生的方法.分析了公开密钥密码技术的安全性、保密性以及发展前景. 相似文献
380.
混沌系统因对初始条件和参数具有极度的敏感性、遍历性和不可预测性,被广泛应用于图像加密领域。提出了一种二维映射——二维Chebyshev-Sine映射。通过分析轨迹图得到映射,与其他混沌映射相比,此映射拥有更宽广的混沌范围和良好的遍历性,对初始条件和系统参数具有高度敏感性,实现成本相对较低。基于此,提出了一种线性混合层图像加密算法:通过行移位和列混合有效改变图像像素空间位置和像素频域中的值,同时使用了中国剩余定理的扩散原则。实验仿真结果证明,此加密算法具有抵抗差分攻击和选择明文攻击的性能,且运行速度快,安全性较高。 相似文献