首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   318篇
  免费   93篇
化学   9篇
力学   1篇
综合类   12篇
数学   33篇
物理学   356篇
  2024年   2篇
  2023年   4篇
  2022年   35篇
  2021年   28篇
  2020年   17篇
  2019年   5篇
  2018年   3篇
  2017年   32篇
  2016年   14篇
  2015年   16篇
  2014年   37篇
  2013年   27篇
  2012年   22篇
  2011年   29篇
  2010年   20篇
  2009年   22篇
  2008年   25篇
  2007年   16篇
  2006年   12篇
  2005年   13篇
  2004年   8篇
  2003年   8篇
  2002年   1篇
  2001年   3篇
  2000年   1篇
  1999年   1篇
  1998年   6篇
  1997年   3篇
  1992年   1篇
排序方式: 共有411条查询结果,搜索用时 687 毫秒
91.
司红伟  钟国韵 《应用声学》2015,23(7):2475-2477, 2481
为了克服大数据在采用串行加密方式时具有的加密效率低的问题,设计了一种基于双混沌系统的大数据环境的并行加密算法。首先,在对经典的Map-Reduce分布式并行计算框架进行研究的基础上,设计了大数据环境的并行加密模型。然后,设计了改进的Logistic映射和Tent映射构成双混沌系统,在此基础上,设计了Map函数、Sort函数和Reduce函数实现并行加密,在Map函数中通过Logistic映射和Tent映射的不断迭代计算加密密钥或解密密钥,实现明文到密文或密文到明文的转换,在Sort 函数对由Map函数输出的键值对进行排序并剔除重复的数据块,在Reduce函数中对加密后的密文数据块或解密后的明文数据块进一步合并构成输出数据,并生成Logistic映射和Tent映射的迭代次数初始值并保存在历史数据信息中。仿真实验表明:文中设计的基于双混沌系统的Map-Reduce并行加密模型能高效地进行数据加密或解密,能提高数据安全性和加密效率,具有较强的可行性。  相似文献   
92.
In this paper, a novel image encryption algorithm is proposed. The cycle shift in bits of pixels and the chaotic system are employed for the encryption of the proposed scheme. For cycle shift operations, random integers with the same size of the original image are produced to scramble the plaintext image. Moreover, the scrambled image effects the initial values of the chaotic system for the further encryption process, which increases the sensitivity of plaintext images of the scheme. The scrambled image is encrypted into the ciphered image by the keys which are produced by the chaotic system. The simulation experiments and theoretical analyses indicate that the proposed scheme is superior and able to resist exhaustive attack and statistical attack.  相似文献   
93.
周文刚  赵宇  朱海 《应用声学》2015,23(1):207-210
为了满足高速即时通信对密码运算的性能要求,在研究AES-ECB典型设计的基础上,提出了一种基于多线程技术的AES-ECB改进设计方案。通过对算法中间迭代过程进行分割,并将其例化为多个子线程,改进了算法运行流程,实现了子线程间的“类流水”操作。实例性能分析表明,相比于单线程,多线程性能提高了约0.46至4.27倍;当线程数为12时,算法处理性能最低为520Mbps,适用于对加解密速度要求高的应用场合。  相似文献   
94.
Nowadays, embedded network products are widely used in various technological fields. However, when such products are used, the transmission of network data could not be guaranteed with high security. To address the issue, this paper designed a network encryption machine based on S3C6410 processor and DM9000 Ethernet controller. The hardware circuit of this encryption machine is designed and developed with conciseness and stability. In software design, an improved algorithm of chaotic encryption based on Henon mapping is proposed. The algorithm overcomes the shortcoming in combining Logistic and Tent chaotic sequences. Moreover, the paper demonstrates some comparative experiments about autocorrelation and randomness. The results indicate that the new algorithm based on Henon chaotic sequences has a good performance in safety and is able to meet the requirements of confidential communications.  相似文献   
95.
We propose a novel color image hiding scheme with three channels of cascaded Fresnel domain phase-only filtering. The original color image is encoded into three phase masks by using the Gerchberg–Saxton iterative phase retrieval algorithm with another predefined phase key. The individual phase masks are placed in the inputs of the Fresnel domains of the red–green–blue channels and the phase key in the public channel, during the optical retrieval. The physical parameters in the optical system will be regarded as the additional keys for security enhancement. Numerical simulation is performed to test the validity of our scheme.  相似文献   
96.
In 1 Matsumoto and Imai developed a new public key scheme, called C*, for enciphering or signing. (This scheme is completely different from and should not be mistaken with another scheme of Matsumoto and Imai developed in 1983 in 7 and broken in 1984 in 8). No attacks have been published as yet for this scheme. However, in this paper, we will see that—for almost all keys—almost every cleartext can be found from its ciphertext after only approximately m 2 n 4 log n computations, where m is the degree of the chosen field K and mn is the number of bits of text. Moreover, for absolutely all keys that give a practical size for the messages, it will be possible to find almost all cleartexts from the corresponding ciphertexts after a feasible computation. Thus the algorithm of 1 is insecure.  相似文献   
97.
Parallel architectures and algorithms may offer a solution to the system bottleneck arising from the need to encrypt a very large amount of data without compromising security. In this respect the use of cellular automata with their parallel, simple, regular and modular structure is very promising. We extend the blockcipher algorithm, based on the iterations of so called “toggle” cellular automata rules to two dimensions.The advantages are higher complexity of the crypt-analytical attacks and substantial increase in the speed of the algorithm. Due to its massive parallelism and interconnectivity, the algorithm is very suitable for opto-electronic implementation.  相似文献   
98.
Several secure image encryption systems have been researched and formed by chaotic mechanisms in current decades. This work recommends an innovative quantum color image encryption method focused on the Lucas series-based substitution box to enhance the competence of encryption. The suggested encryption technique has more excellent key space and significant confidentiality. The chaotic system, along with the substitution box, exhibits additional complicated dynamical behavior, sufficient arbitrariness, and uncertainty than all others focused on just chaotic models. Theoretical and simulation assessments show that the offered image encryption performs admirably, its traditional equivalents in terms by efficiency in terms of statistical analysis.  相似文献   
99.
采用高温固相法在单一基质中制备了具有多模态发光特性的系列荧光粉BaGa2Si2O8∶Eu2+,Eu3+,Pr3+,掺入适量的Pr3+可显著改善荧光粉的余辉发光性能。结果表明,该系列荧光粉在254 nm或365 nm的光激发下,具有不同颜色的光致发光和余辉发光,体现出多模发光特征;同时该系列荧光粉的余辉发光还具有不同的衰减时间。根据这些发光特性,选用合适的荧光粉制作了系列发光图案。相关典型应用示例表明,该发光图案的多模发光特征可应用于发光防伪应用,而基于其差异化的余辉衰减特性,还可以设计出可动态变化的余辉发光图案,从而增加发光防伪和加密的安全层级。  相似文献   
100.
薛薇  张永超 《计算物理》2020,37(4):497-504
基于保守超混沌信号,提出一种数字图像加密算法.该算法利用一个5维保守超混沌系统产生5通道时间序列对原图像分别进行RGB三基色像素级和比特级置乱,再对置乱的RGB三基色作异或操作.在此基础上,利用其中一个通道的时间序列作为密钥分别进行一次正向异或操作的扩散和S盒处理,一次反向异或操作的扩散与S盒处理及置乱,得到加密的图像.最后利用直方图、信息熵、密钥空间等安全性指标对该加密算法进行测试,并与一个五维耗散超混沌系统应用于图像加密的实例进行对比.数值结果表明保守混沌应用到数字图像加密的算法具有更高的安全性和可靠性.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号