首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1009篇
  免费   161篇
  国内免费   36篇
化学   33篇
力学   5篇
综合类   20篇
数学   118篇
物理学   140篇
无线电   890篇
  2024年   1篇
  2023年   4篇
  2022年   15篇
  2021年   19篇
  2020年   26篇
  2019年   22篇
  2018年   14篇
  2017年   22篇
  2016年   38篇
  2015年   36篇
  2014年   55篇
  2013年   50篇
  2012年   61篇
  2011年   74篇
  2010年   67篇
  2009年   77篇
  2008年   80篇
  2007年   85篇
  2006年   86篇
  2005年   71篇
  2004年   46篇
  2003年   46篇
  2002年   36篇
  2001年   36篇
  2000年   38篇
  1999年   23篇
  1998年   24篇
  1997年   12篇
  1996年   10篇
  1995年   11篇
  1994年   7篇
  1993年   2篇
  1992年   3篇
  1991年   4篇
  1990年   1篇
  1989年   1篇
  1985年   1篇
  1983年   1篇
  1978年   1篇
排序方式: 共有1206条查询结果,搜索用时 15 毫秒
131.
对一种自证明签名方案的攻击和改进   总被引:1,自引:0,他引:1       下载免费PDF全文
李新国  葛建华  赵春明 《电子学报》2004,32(8):1364-1366
本文对一种自证明签名方案实施了伪造攻击.在这种攻击下CA通过改变数字签名中的相关参数,可以对其用户的任意消息伪造自证明签名.本文提出了能抵抗该攻击的改进方案,分析表明改进方案和Schnorr签名具有相同的安全性.  相似文献   
132.
在A≈80区奇-奇核旋称反转问题上已提出几种机制,但没有一种理论推断是结论性的.在本工作中将角动量投影壳模型应用到80,82Rb核,对组态为πg9/2⊙νg9/2的正宇称晕带和组态为π(p1/2,p3/2,f5/2)⊙νg9/2 的负宇称晕带理论计算和实验结果进行了比较,特别是对正宇称晕带中的signature反转机制进行了探讨.角动量投影壳模型计算显示正宇称晕带中的signature反转是原子核随自旋增加形状发生变化的信号,其间原子核从低自旋的长椭球变到高自旋的扁椭球.此外,还确定了此两带的原子核形状  相似文献   
133.
As the use of signatures for identification purposes is pervasive in society and has a long history in business, dynamic signature verification (DSV) could be an answer to authenticating a document signed electronically and establishing the identity of that document in a dispute. DSV has the advantage in that traits of the signature can be collected on a digitizer. The research question of this paper is to understand how the individual variables vary across devices. In applied applications, this is important because if the signature variables change across the digitizers this will impact performance and the ability to use those variable. Understanding which traits are consistent across devices will aid dynamic signature algorithm designers to create more robust algorithms.  相似文献   
134.
Certificateless cryptography involves a Key Generation Center (KGC) which issues a partial key to a user and the user also independently generates an additional public/secret key pair in such a way that the KGC who knows only the partial key but not the additional secret key is not able to do any cryptographic operation on behalf of the user; and a third party who replaces the public/secret key pair but does not know the partial key cannot do any cryptographic operation as the user either. We call this attack launched by the third party as the key replacement attack. In ACISP 2004, Yum and Lee proposed a generic construction of digital signature schemes under the framework of certificateless cryptography. In this paper, we show that their generic construction is insecure against key replacement attack. In particular, we give some concrete examples to show that the security requirements of some building blocks they specified are insufficient to support some of their security claims. We then propose a modification of their scheme and show its security in a new and simplified security model. We show that our simplified definition and adversarial model not only capture all the distinct features of certificateless signature but are also more versatile when compared with all the comparable ones. We believe that the model itself is of independent interest.A conventional certificateless signature scheme only achieves Girault’s Level 2 security. For achieving Level 3 security, that a conventional signature scheme in Public Key Infrastructure does, we propose an extension to our definition of certificateless signature scheme and introduce an additional security model for this extension. We show that our generic construction satisfies Level 3 security after some appropriate and simple modification. A preliminary version of the extended abstract of partial results appeared in ACISP 2006 [9].  相似文献   
135.
一种改进的椭圆曲线算法及在电子商务中的应用   总被引:4,自引:2,他引:2  
椭圆曲线公钥密码体制(ECC)具有最高的位安全强度。文章分析了ECC的优势,讨论了椭圆曲线的数学基础和离散对数问题的复杂性,并对现有的ECC数字签名算法(ECDSA)进行了改进,进一步加快了运算速度,缩短了数据传输的时间。将改进的椭圆曲线密码体制应用在电子商务中实现数字签名,取得了较好的效果。  相似文献   
136.
一种移动Agent的安全认证方案的设计与实现   总被引:2,自引:0,他引:2  
针对移动Agent的安全问题,简要介绍了几种常用的安全认证技术,并在公钥密码体制认证方案的基础上,提出并实现了一种可用于移动Agent和Agent平台之间安全认证的方案。证书采用X.509证书格式,使用RSA和IDEA混合加密的算法,密钥管理采用PGP算法中公私钥环的方式,使该认证方案具有很高的安全性。文中详细说明了方案的实现流程,并深入分析了其安全性。结果表明,采用该方案能有效改善移动Agent的安全性。  相似文献   
137.
隆永红 《电子学报》1995,23(1):15-20
本文讨论了基于纠错码的公钥体制PEPS2和ECPS3中加密过程的安全性,指出可以在O(n^3)时间内由体制的公开钥信息找到一个转换矩阵,用它也可以解密由秘密置换阵加密的消息,其中n为稳定置换阵的行(列)数,进而,本文给出了用所找到的置换阵破译ECPS2加密和ECPS3部分情况下加密的方法。  相似文献   
138.
两种门限签名方案的密码学分析及其改进   总被引:14,自引:0,他引:14  
谢琪 《通信学报》2005,26(7):123-128
Jan等和Gan分别提出了抗合谋攻击的门限签名方案。给出了一种合谋攻击方案表明他们的方案是不安全的,任何一组成员可以合谋假冒另一组成员对任何消息生成有效的门限签名而不需负任何责任。一旦事后发生纠纷,指定的秘书可以打开签名,而被假冒的成员无法否认签名。为克服他们的方案的安全性缺陷,给出了一个改进方案。并且,基于改进的方案,提出了一个可以追查签名者身份的、抗合谋攻击的门限签名方案。  相似文献   
139.
We introduce the notion of signature for relations in mapping class groups and show that the signature of a Lefschetz fibration over the 2-sphere is the sum of the signatures for basic relations contained in its monodromy. Combining explicit calculations of the signature cocycle with a technique of substituting positive relations, we give some new examples of non-holomorphic Lefschetz fibrations of genus and which violate slope bounds for non-hyperelliptic fibrations on algebraic surfaces of general type.

  相似文献   

140.
We present protocols for speeding up fixed-base variable-exponent exponentiation and variable-base fixed-exponent exponentiation using an untrusted computational resource. In the fixed-base protocols, the exponent may be blinded. In the variable-base protocols, the base may be blinded. The protocols are described for exponentiation in a cyclic group. We describe how to extend them to exponentiation modulo an integer where the modulus is the product of primes with single multiplicity. The protocols provide a speedup of over the square-and-multiply algorithm, where k is the bitlength of the exponent. One application of the protocols is to speed up exponentiation-based verification in discrete log-based signature and credential schemes. The protocols also allow signature verifiers to dynamically choose, for each message, the amount of work it would like to perform to verify the signature. This results in a work-security tradeoff. We introduce a fifth protocol to perform variable-base variable- exponent exponentiation, which also has this feature. Our model allows the trusted resource to perform computations in its idle time. The protocols facilitate the offloading of work to the offline stage, such that the work the trusted resource performs when it has to do an exponentiation is smaller. Our protocols are unconditionally secure.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号