全文获取类型
收费全文 | 287篇 |
免费 | 63篇 |
国内免费 | 11篇 |
专业分类
化学 | 3篇 |
综合类 | 9篇 |
数学 | 133篇 |
物理学 | 216篇 |
出版年
2024年 | 1篇 |
2023年 | 5篇 |
2022年 | 12篇 |
2021年 | 13篇 |
2020年 | 3篇 |
2019年 | 2篇 |
2018年 | 4篇 |
2017年 | 7篇 |
2016年 | 10篇 |
2015年 | 5篇 |
2014年 | 12篇 |
2013年 | 15篇 |
2012年 | 14篇 |
2011年 | 27篇 |
2010年 | 28篇 |
2009年 | 21篇 |
2008年 | 29篇 |
2007年 | 23篇 |
2006年 | 38篇 |
2005年 | 22篇 |
2004年 | 12篇 |
2003年 | 5篇 |
2002年 | 26篇 |
2001年 | 5篇 |
2000年 | 9篇 |
1998年 | 6篇 |
1997年 | 3篇 |
1996年 | 2篇 |
1988年 | 1篇 |
1980年 | 1篇 |
排序方式: 共有361条查询结果,搜索用时 15 毫秒
81.
Error reconciliation is a necessary step for quantum key distribution process. In this paper, the correction ability of error reconciliation procedure which is called Winnow protocol is analyzed and estimated, moreover, it gives some expressions about it. The experiment results proved the capability of Winnow protocol are excellent. It is also indicates that the smallest N has the most correction efficiency where from the communication times between the legitimate parties and the data remaining efficiency consideration. 相似文献
82.
This paper points out that, due to a flaw in the sender's encoding, the receiver in Gao et al.'s controlled quantum secret direct communication (CQSDC) protocol [Chin. Phys. 14 (2005), No. 5, p. 893] can reveal the whole secret message without permission from the controller. An improvement is proposed to avoid this flaw. 相似文献
83.
Simon Blake-Wilson 《Designs, Codes and Cryptography》2000,19(2-3):77-99
Public-key cryptography is today recognized as an important tool in the provision of information security. This article gives an overview of the field on the occasion of its 22nd birthday. 相似文献
84.
A scheme of quantum network based on multiuser differential phase shift quantum key distribution system (DPS-QKD) is proposed. In this quantum network, arbitrary two users can achieve secret bits sharing by point-to-multipoint quantum key distribution and secret bits comparison. A protocol of secret bits sharing between arbitrary two users is presented. This network can implement secret bits distribution over 200 km with higher key generation rate by today's technologies. In theory, the capacity of user numbers in this network is unlimited. Hence, our proposed quantum network can serve for a metropolitan QKD network. A wide area QKD network can be constructed with this metropolitan QKD network. 相似文献
85.
86.
The security of quantum secure direct communication by entangled qutrits and entanglement swapping [Y.B. Zhan et al., Opt. Commun. 282 (2009) 4633] is analyzed. It is shown that an eavesdropper can obtain all the secret without being found by a simple intercept-and-resend attack. Finally, a possible improvement to resist this attack is proposed. 相似文献
87.
Annegret Weng 《Designs, Codes and Cryptography》2006,38(3):383-393
Combining the ideas of Bauer, Teske and Weng, [1] and Gaudry, Schost [3], we give a low memory algorithm for computing the
number of points on the Jacobian of a Picard curve. It is efficient enough to handle Picard curves over finite prime fields
, where p is a prime with 58 bits. We present an example where the Jacobian has a prime group order of size 2174 相似文献
88.
In this paper, we investigate the best pixel expansion of various models of visual cryptography schemes. In this regard, we consider visual cryptography schemes introduced by Tzeng and Hu (2002) [13]. In such a model, only minimal qualified sets can recover the secret image and the recovered secret image can be darker or lighter than the background. Blundo et al. (2006) [4] introduced a lower bound for the best pixel expansion of this scheme in terms of minimal qualified sets. We present another lower bound for the best pixel expansion of the scheme. As a corollary, we introduce a lower bound, based on an induced matching of hypergraph of qualified sets, for the best pixel expansion of the aforementioned model and the traditional model of visual cryptography scheme realized by basis matrices. Finally, we study access structures based on graphs and we present an upper bound for the smallest pixel expansion in terms of strong chromatic index. 相似文献
89.
Ernst M. Gabidulin 《Designs, Codes and Cryptography》2008,48(2):171-177
The public key cryptosystem based on rank error correcting codes (the GPT cryptosystem) was proposed in 1991. Several attacks
against this system were published, including Gibson’s attacks and recent Overbeck’s attacks. In this paper, we improve the
GPT system by more careful choice of parameters to withstand these attacks.
相似文献
90.
A New Approach for Visual Cryptography 总被引:1,自引:0,他引:1
Visual cryptography is to encrypt a secret image into some shares (transparencies) such that any qualified subset of the shares can recover the secret visually. The conventional definition requires that the revealed secret images are always darker than the backgrounds. We observed that this is not necessary, in particular, for the textual images.In this paper, we proposed an improved definition for visual cryptography based on our observation, in which the revealed images may be darker or lighter than the backgrounds. We studied properties and obtained bounds for visual cryptography schemes based on the new definition. We proposed methods to construct visual cryptography schemes based on the new definition. The experiments showed that visual cryptography schemes based on our definition indeed have better pixel expansion in average. 相似文献