首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   982篇
  免费   161篇
  国内免费   36篇
化学   32篇
力学   5篇
综合类   20篇
数学   118篇
物理学   137篇
无线电   867篇
  2023年   2篇
  2022年   10篇
  2021年   19篇
  2020年   21篇
  2019年   18篇
  2018年   13篇
  2017年   22篇
  2016年   36篇
  2015年   32篇
  2014年   54篇
  2013年   48篇
  2012年   61篇
  2011年   74篇
  2010年   67篇
  2009年   77篇
  2008年   80篇
  2007年   85篇
  2006年   86篇
  2005年   71篇
  2004年   46篇
  2003年   46篇
  2002年   36篇
  2001年   36篇
  2000年   38篇
  1999年   23篇
  1998年   24篇
  1997年   12篇
  1996年   10篇
  1995年   11篇
  1994年   7篇
  1993年   2篇
  1992年   3篇
  1991年   4篇
  1990年   1篇
  1989年   1篇
  1985年   1篇
  1983年   1篇
  1978年   1篇
排序方式: 共有1179条查询结果,搜索用时 562 毫秒
971.
分析了一些典型的代理多重签名方案,发现已经存在的方案存在漏洞,容易受到内部攻击和外部攻击,针对以上问题提出一个新的代理多重签名方案,改进后的方案克服了原方案的缺陷,通过性能分析,新的方案更加安全可靠.  相似文献   
972.
Based on provable data possession(PDP)model,a more perfect data integrity checking model for mobile cloud computing was proposed,in which there was an additional proxy party with stronger computing power to help the mobile users to calculate the block tags.Furthermore,for the proposed model,an identity-based proxy signature PDP(IBPS-PDP)protocol was presented.By using identity-based signatures,the system did not need to manage public key certificates and further the users did not need to take the additional computations to verify the other’s certificates yet.Finally,the security of the proposed IBPS-PDP protocol is proved in the random oracle model.  相似文献   
973.
In the electro-mechanical impedance (EMI) technique, which is based on induced strain actuation through piezoelectric ceramic (PZT) patch, the knowledge of shear stress distribution in the adhesive bond layer between the patch and the host structure is very pertinent for reliable health monitoring of structures. The analytical derivation of continuum based shear lag model covered in this paper aims to provide an improved and more accurate model for shear force interaction between the host structure and the PZT patch (assumed square for simplicity) through the adhesive bond layer, taking care of all the piezo, structural and adhesive effects rigorously and simultaneously. Further, it eliminates the hassle of determining the equivalent impedance of the structure and the actuator separately, as required in the previous models, which was approximate in nature. The results are compared with the previous models to highlight the higher accuracy of the new approach. Based on the new model, a continuum based interaction term has been derived for quantification of the shear lag and inertia effects.  相似文献   
974.
平安城市的发展致力于大安全防护体系,重点保障各种网络中资源的有效融合,并保障资源再使用过程中的可控可管,既保证有效用户对资源的实时访问,又能对非法用户的访问进行禁止。目前各种网络中大多已经建设了各自独立的安全防护体系,在资源整合的过程中必然涉及到安全防护体系的融合,因此构建一个能够支持各种安全体系融合信息安全防护方案已经成为平安城市未来信息安全防护的必然趋势。  相似文献   
975.
For millennia humans have benefitted from application of the acute canine sense of smell to hunt, track and find targets of importance. In this report, canines were evaluated for their ability to detect the severe exotic phytobacterial arboreal pathogen Xanthomonas citri pv. citri (Xcc), which is the causal agent of Asiatic citrus canker (Acc). Since Xcc causes only local lesions, infections are non-systemic, limiting the use of serological and molecular diagnostic tools for field-level detection. This necessitates reliance on human visual surveys for Acc symptoms, which is highly inefficient at low disease incidence, and thus for early detection. In simulated orchards the overall combined performance metrics for a pair of canines were 0.9856, 0.9974, 0.9257 and 0.9970, for sensitivity, specificity, precision, and accuracy, respectively, with 1–2 s/tree detection time. Detection of trace Xcc infections on commercial packinghouse fruit resulted in 0.7313, 0.9947, 0.8750, and 0.9821 for the same performance metrics across a range of cartons with 0–10% Xcc-infected fruit despite the noisy, hot and potentially distracting environment. In orchards, the sensitivity of canines increased with lesion incidence, whereas the specificity and overall accuracy was >0.99 across all incidence levels; i.e., false positive rates were uniformly low. Canines also alerted to a range of 1–12-week-old infections with equal accuracy. When trained to either Xcc-infected trees or Xcc axenic cultures, canines inherently detected the homologous and heterologous targets, suggesting they can detect Xcc directly rather than only volatiles produced by the host following infection. Canines were able to detect the Xcc scent signature at very low concentrations (10,000× less than 1 bacterial cell per sample), which implies that the scent signature is composed of bacterial cell volatile organic compound constituents or exudates that occur at concentrations many fold that of the bacterial cells. The results imply that canines can be trained as viable early detectors of Xcc and deployed across citrus orchards, packinghouses, and nurseries.  相似文献   
976.
范会敏  寇张盈 《电子测试》2014,(Z1):157-159
为防止非法用户在公安现场勘验信息系统中录入或修改现场勘验信息内容,系统采用数字签名提供信息的防冒充、防篡改等服务,以保证勘验信息的真实性和系统的安全性。论文通过对系统功能设计以及对与系统相关数字签名算法的分析和应用,从而使系统成为一个高效、安全且易用的信息系统。  相似文献   
977.
曾捷  聂伟 《通信学报》2014,35(8):26-222
针对固定维数的格基委托算法或格上基于盆景树生成的代理签名方案中私钥和签名的长度均过大的问题,提出一种较小尺寸的代理签名方案。该方案对随机预言机进行了合并优化,并使用一个更小范数但是向量盲化的消息,从而控制代理签名私钥的维数,其安全性基于格上最短向量问题和小整数解问题的困难性,并且满足代理签名方案所有的安全性要求。与现有方案相比,该方案有效地减小了代理签名私钥和代理签名的长度,使代理私钥长度与原始签名用户私钥长度相当。  相似文献   
978.
为了解决质量检测机构中有关电子检验报告的防伪问题,结合传统印章校验的直观等特点,提出了用数字签名与数字水印技术相结合的方法.将电子检验报告文档的数字签名和电子图章本身的电子签名一起作为水印嵌入到电子图章中.该方法解决了电子商务环境下,电子检验报告的完整性和不可伪造性.通过实验的验证,该方法能较好地解决有关电子检验报告的防伪问题.  相似文献   
979.
近些年来伪基站垃圾短信的泛滥是导致垃圾短信无法根治的重要原因。与目前普遍采取的单独从终端或者网络一侧对伪基站垃圾短信进行防治的方法相比,本文提出了一种终端和业务两侧协同的防治方法,通过业务侧对端口类短信进行数字签名和在终端侧进行验证,在不影响用户短信业务体验的前提下,在智能终端上实现了对伪基站所发送端口类短信的100%的识别和拦截。  相似文献   
980.
As an important component of intelligent transportation systems, vehicular ad hoc networks can provide safer and more comfortable driving circumstance for the drivers. However, communication security and privacy issues present practical concerns to the deployment of vehicular ad hoc networks. Although recent related studies have already addressed most of these issues, most of them have only considered a posteriori countermeasures or a priori countermeasures to prevent the attacks of an adversary. To the best of our knowledge, up to now, only two privacy‐preserving authentication schemes can provide a posteriori countermeasures and a priori countermeasures. But, the computational cost of verifying a signature is relatively high or security proof of the scheme is loose in the two schemes. In this paper, we propose two novel privacy‐preserving authentication schemes. The first one cannot only provide a posteriori and a priori countermeasures, but also has low computational cost in the verification phase and tight security proof. The second one can achieve batch verification on multiple messages. Comparison with Wu et al.'s scheme and Chen et al's scheme, our scheme shows higher efficiency in terms of the computational cost of verifying signature.Copyright © 2013 John Wiley & Sons, Ltd.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号