全文获取类型
收费全文 | 318篇 |
免费 | 93篇 |
专业分类
化学 | 9篇 |
力学 | 1篇 |
综合类 | 12篇 |
数学 | 33篇 |
物理学 | 356篇 |
出版年
2024年 | 2篇 |
2023年 | 4篇 |
2022年 | 35篇 |
2021年 | 28篇 |
2020年 | 17篇 |
2019年 | 5篇 |
2018年 | 3篇 |
2017年 | 32篇 |
2016年 | 14篇 |
2015年 | 16篇 |
2014年 | 37篇 |
2013年 | 27篇 |
2012年 | 22篇 |
2011年 | 29篇 |
2010年 | 20篇 |
2009年 | 22篇 |
2008年 | 25篇 |
2007年 | 16篇 |
2006年 | 12篇 |
2005年 | 13篇 |
2004年 | 8篇 |
2003年 | 8篇 |
2002年 | 1篇 |
2001年 | 3篇 |
2000年 | 1篇 |
1999年 | 1篇 |
1998年 | 6篇 |
1997年 | 3篇 |
1992年 | 1篇 |
排序方式: 共有411条查询结果,搜索用时 687 毫秒
91.
为了克服大数据在采用串行加密方式时具有的加密效率低的问题,设计了一种基于双混沌系统的大数据环境的并行加密算法。首先,在对经典的Map-Reduce分布式并行计算框架进行研究的基础上,设计了大数据环境的并行加密模型。然后,设计了改进的Logistic映射和Tent映射构成双混沌系统,在此基础上,设计了Map函数、Sort函数和Reduce函数实现并行加密,在Map函数中通过Logistic映射和Tent映射的不断迭代计算加密密钥或解密密钥,实现明文到密文或密文到明文的转换,在Sort 函数对由Map函数输出的键值对进行排序并剔除重复的数据块,在Reduce函数中对加密后的密文数据块或解密后的明文数据块进一步合并构成输出数据,并生成Logistic映射和Tent映射的迭代次数初始值并保存在历史数据信息中。仿真实验表明:文中设计的基于双混沌系统的Map-Reduce并行加密模型能高效地进行数据加密或解密,能提高数据安全性和加密效率,具有较强的可行性。 相似文献
92.
In this paper, a novel image encryption algorithm is proposed. The cycle shift in bits of pixels and the chaotic system are employed for the encryption of the proposed scheme. For cycle shift operations, random integers with the same size of the original image are produced to scramble the plaintext image. Moreover, the scrambled image effects the initial values of the chaotic system for the further encryption process, which increases the sensitivity of plaintext images of the scheme. The scrambled image is encrypted into the ciphered image by the keys which are produced by the chaotic system. The simulation experiments and theoretical analyses indicate that the proposed scheme is superior and able to resist exhaustive attack and statistical attack. 相似文献
93.
94.
Chunlei Fan Qi Zhang Haoran Sun Bingbing Song Qun Ding 《Journal of Applied Analysis & Computation》2016,6(4):1126-1134
Nowadays, embedded network products are widely used in various technological fields. However, when such products are used, the transmission of network data could not be guaranteed with high security. To address the issue, this paper designed a network encryption machine based on S3C6410 processor and DM9000 Ethernet controller. The hardware circuit of this encryption machine is designed and developed with conciseness and stability. In software design, an improved algorithm of chaotic encryption based on Henon mapping is proposed. The algorithm overcomes the shortcoming in combining Logistic and Tent chaotic sequences. Moreover, the paper demonstrates some comparative experiments about autocorrelation and randomness. The results indicate that the new algorithm based on Henon chaotic sequences has a good performance in safety and is able to meet the requirements of confidential communications. 相似文献
95.
We propose a novel color image hiding scheme with three channels of cascaded Fresnel domain phase-only filtering. The original color image is encoded into three phase masks by using the Gerchberg–Saxton iterative phase retrieval algorithm with another predefined phase key. The individual phase masks are placed in the inputs of the Fresnel domains of the red–green–blue channels and the phase key in the public channel, during the optical retrieval. The physical parameters in the optical system will be regarded as the additional keys for security enhancement. Numerical simulation is performed to test the validity of our scheme. 相似文献
96.
Jacques Patarin 《Designs, Codes and Cryptography》2000,20(2):175-209
In 1 Matsumoto and Imai developed a new public key scheme, called C*, for enciphering or signing. (This scheme is completely different from and should not be mistaken with another scheme of Matsumoto and Imai developed in 1983 in 7 and broken in 1984 in 8). No attacks have been published as yet for this scheme. However, in this paper, we will see that—for almost all keys—almost every cleartext can be found from its ciphertext after only approximately m
2
n
4 log n computations, where m is the degree of the chosen field K and mn is the number of bits of text. Moreover, for absolutely all keys that give a practical size for the messages, it will be possible to find almost all cleartexts from the corresponding ciphertexts after a feasible computation. Thus the algorithm of 1 is insecure. 相似文献
97.
Opto-Electronic Block-Cipher Based on Iteration of the 2-D Toggle Cellular Automata: Algorithm 总被引:2,自引:0,他引:2
Maria Madjarova Mitsugu Kakuta Takashi Obi Masahiro Yamaguchi Nagaaki Ohyama 《Optical Review》1999,6(2):110-117
Parallel architectures and algorithms may offer a solution to the system bottleneck arising from the need to encrypt a very large amount of data without compromising security. In this respect the use of cellular automata with their parallel, simple, regular and modular structure is very promising. We extend the blockcipher algorithm, based on the iterations of so called “toggle” cellular automata rules to two dimensions.The advantages are higher complexity of the crypt-analytical attacks and substantial increase in the speed of the algorithm. Due to its massive parallelism and interconnectivity, the algorithm is very suitable for opto-electronic implementation. 相似文献
98.
Several secure image encryption systems have been researched and formed by chaotic mechanisms in current decades. This work recommends an innovative quantum color image encryption method focused on the Lucas series-based substitution box to enhance the competence of encryption. The suggested encryption technique has more excellent key space and significant confidentiality. The chaotic system, along with the substitution box, exhibits additional complicated dynamical behavior, sufficient arbitrariness, and uncertainty than all others focused on just chaotic models. Theoretical and simulation assessments show that the offered image encryption performs admirably, its traditional equivalents in terms by efficiency in terms of statistical analysis. 相似文献
99.
采用高温固相法在单一基质中制备了具有多模态发光特性的系列荧光粉BaGa2Si2O8∶Eu2+,Eu3+,Pr3+,掺入适量的Pr3+可显著改善荧光粉的余辉发光性能。结果表明,该系列荧光粉在254 nm或365 nm的光激发下,具有不同颜色的光致发光和余辉发光,体现出多模发光特征;同时该系列荧光粉的余辉发光还具有不同的衰减时间。根据这些发光特性,选用合适的荧光粉制作了系列发光图案。相关典型应用示例表明,该发光图案的多模发光特征可应用于发光防伪应用,而基于其差异化的余辉衰减特性,还可以设计出可动态变化的余辉发光图案,从而增加发光防伪和加密的安全层级。 相似文献
100.
基于保守超混沌信号,提出一种数字图像加密算法.该算法利用一个5维保守超混沌系统产生5通道时间序列对原图像分别进行RGB三基色像素级和比特级置乱,再对置乱的RGB三基色作异或操作.在此基础上,利用其中一个通道的时间序列作为密钥分别进行一次正向异或操作的扩散和S盒处理,一次反向异或操作的扩散与S盒处理及置乱,得到加密的图像.最后利用直方图、信息熵、密钥空间等安全性指标对该加密算法进行测试,并与一个五维耗散超混沌系统应用于图像加密的实例进行对比.数值结果表明保守混沌应用到数字图像加密的算法具有更高的安全性和可靠性. 相似文献