全文获取类型
收费全文 | 1009篇 |
免费 | 161篇 |
国内免费 | 36篇 |
专业分类
化学 | 33篇 |
力学 | 5篇 |
综合类 | 20篇 |
数学 | 118篇 |
物理学 | 140篇 |
无线电 | 890篇 |
出版年
2024年 | 1篇 |
2023年 | 4篇 |
2022年 | 15篇 |
2021年 | 19篇 |
2020年 | 26篇 |
2019年 | 22篇 |
2018年 | 14篇 |
2017年 | 22篇 |
2016年 | 38篇 |
2015年 | 36篇 |
2014年 | 55篇 |
2013年 | 50篇 |
2012年 | 61篇 |
2011年 | 74篇 |
2010年 | 67篇 |
2009年 | 77篇 |
2008年 | 80篇 |
2007年 | 85篇 |
2006年 | 86篇 |
2005年 | 71篇 |
2004年 | 46篇 |
2003年 | 46篇 |
2002年 | 36篇 |
2001年 | 36篇 |
2000年 | 38篇 |
1999年 | 23篇 |
1998年 | 24篇 |
1997年 | 12篇 |
1996年 | 10篇 |
1995年 | 11篇 |
1994年 | 7篇 |
1993年 | 2篇 |
1992年 | 3篇 |
1991年 | 4篇 |
1990年 | 1篇 |
1989年 | 1篇 |
1985年 | 1篇 |
1983年 | 1篇 |
1978年 | 1篇 |
排序方式: 共有1206条查询结果,搜索用时 0 毫秒
891.
Coherent systems are very important in reliability,survival analysis and other life sciences.In this paper,we consider the number of failed components in an(n-k+1)-out-of-n system,given that at least m(m相似文献
892.
893.
894.
RSA非对称加密算法在数字签名中的应用研究 总被引:3,自引:3,他引:0
随着计算机网络通信技术的发展,对信息安全的要求也越来越高,信息加密技术也需进一步的提高。为了提高数据在计算机网络传输过程中的安全性,文中应用了RSA非对称加密算法及RSA操作和RSA填充问题,并给出了RSA非对称加密算法在数字签名中的应用方案,经过测试证明该方案能够进一步提高数据在网络传输过程中的安全性。 相似文献
895.
文中提出了一个基于环Zn上的圆锥曲线的代理盲签名,并对该方案做了分析。该方案的安全性是基于大整数的因数分解困难性和有限群上计算离散对数问题的困难性,由于阶的运算以及点的运算在Cn(a,b)上比较容易,且通过引进标准二进制计算群元素的整数倍的算法,使该方案具有运算速度快,易于实现等优点。 相似文献
896.
ZhaoZemao LiuFengyu 《电子科学学刊(英文版)》2004,21(6):505-510
A general method of constructing proxy blind signature is proposed based on multilinear transform. Based on this method, the four proxy blind signature schemes are correspondently generated with four different signature equations, and each of them has four forms of variations of signs. Hence there are sixteen signatures in all, and all of them are proxy stronglyblind signature schemes. Furthermore, the two degenerated situations of multi-linear transform are discussed. Their corresponding proxy blind signature schemes are shown, too. But some schemes come from one of these degenerate situations are proxy weakly-blind signature scheme. The security for proposed scheme is analyzed in details, The results indicate that these signature schemes have many good properties such as unforgeability, distinguish-ability of proxy signature, non-repudiation and extensive value of application etc. 相似文献
897.
LIU Min-liang ZHANG Yu-hu ZHOU Xiao-hong GUO Ying-xiang LEI Xiang-guo GUO Wen-tao 《原子核物理评论》2009,26(Z1)
Signature inversion in odd-odd nuclei is investigated by using a proton and a neutron coupling to the coherent state of the core.Two parameters are employed in the Hamiltonian to set the energy scales of rotation,neutron-proton coupling and their competition.Typical level staggering is extracted from the calculated level energies.The calculation can approximately reproduce experimental signature inversion.Signature inversion is attributed to the rotational motion and neutronproton residual interaction having reversed signature splitting rules.It is found signature inversion can appear at axially symmetric shape and high-K band. 相似文献
898.
899.
900.
Current identity-based (ID) cryptosystem lacks the mechanisms of two-party authentication and user's private key distribution. Some ID-based signcryption schemes and ID-based authenticated key agreement protocols have been presented, but they cannot solve the problem completely. A novel ID-based authentication scheme based on ID-based encrypfion (IBE) and fingerprint hashing method is proposed to solve the difficulties in the IBE scheme, which includes message receiver authenticating the sender, the trusted authority (TA) authenticating the users and transmitting the private key to them. Furthermore, the scheme extends the application of fingerprint authentication from terminal to network and protects against fingerprint data fabrication. The fingerprint authentication method consists of two factors. This method combines a token key, for example, the USB key, with the user's fingerprint hash by mixing a pseudo-random number with the fingerprint feature. The security and experimental efficiency meet the requirements of practical applications. 相似文献