全文获取类型
收费全文 | 982篇 |
免费 | 161篇 |
国内免费 | 36篇 |
专业分类
化学 | 32篇 |
力学 | 5篇 |
综合类 | 20篇 |
数学 | 118篇 |
物理学 | 137篇 |
无线电 | 867篇 |
出版年
2023年 | 2篇 |
2022年 | 10篇 |
2021年 | 19篇 |
2020年 | 21篇 |
2019年 | 18篇 |
2018年 | 13篇 |
2017年 | 22篇 |
2016年 | 36篇 |
2015年 | 32篇 |
2014年 | 54篇 |
2013年 | 48篇 |
2012年 | 61篇 |
2011年 | 74篇 |
2010年 | 67篇 |
2009年 | 77篇 |
2008年 | 80篇 |
2007年 | 85篇 |
2006年 | 86篇 |
2005年 | 71篇 |
2004年 | 46篇 |
2003年 | 46篇 |
2002年 | 36篇 |
2001年 | 36篇 |
2000年 | 38篇 |
1999年 | 23篇 |
1998年 | 24篇 |
1997年 | 12篇 |
1996年 | 10篇 |
1995年 | 11篇 |
1994年 | 7篇 |
1993年 | 2篇 |
1992年 | 3篇 |
1991年 | 4篇 |
1990年 | 1篇 |
1989年 | 1篇 |
1985年 | 1篇 |
1983年 | 1篇 |
1978年 | 1篇 |
排序方式: 共有1179条查询结果,搜索用时 562 毫秒
971.
张兴华 《信息安全与通信保密》2014,(3):120-122
分析了一些典型的代理多重签名方案,发现已经存在的方案存在漏洞,容易受到内部攻击和外部攻击,针对以上问题提出一个新的代理多重签名方案,改进后的方案克服了原方案的缺陷,通过性能分析,新的方案更加安全可靠. 相似文献
972.
Based on provable data possession(PDP)model,a more perfect data integrity checking model for mobile cloud computing was proposed,in which there was an additional proxy party with stronger computing power to help the mobile users to calculate the block tags.Furthermore,for the proposed model,an identity-based proxy signature PDP(IBPS-PDP)protocol was presented.By using identity-based signatures,the system did not need to manage public key certificates and further the users did not need to take the additional computations to verify the other’s certificates yet.Finally,the security of the proposed IBPS-PDP protocol is proved in the random oracle model. 相似文献
973.
In the electro-mechanical impedance (EMI) technique, which is based on induced strain actuation through piezoelectric ceramic (PZT) patch, the knowledge of shear stress distribution in the adhesive bond layer between the patch and the host structure is very pertinent for reliable health monitoring of structures. The analytical derivation of continuum based shear lag model covered in this paper aims to provide an improved and more accurate model for shear force interaction between the host structure and the PZT patch (assumed square for simplicity) through the adhesive bond layer, taking care of all the piezo, structural and adhesive effects rigorously and simultaneously. Further, it eliminates the hassle of determining the equivalent impedance of the structure and the actuator separately, as required in the previous models, which was approximate in nature. The results are compared with the previous models to highlight the higher accuracy of the new approach. Based on the new model, a continuum based interaction term has been derived for quantification of the shear lag and inertia effects. 相似文献
974.
刘增气 《信息安全与通信保密》2011,9(12):89-91
平安城市的发展致力于大安全防护体系,重点保障各种网络中资源的有效融合,并保障资源再使用过程中的可控可管,既保证有效用户对资源的实时访问,又能对非法用户的访问进行禁止。目前各种网络中大多已经建设了各自独立的安全防护体系,在资源整合的过程中必然涉及到安全防护体系的融合,因此构建一个能够支持各种安全体系融合信息安全防护方案已经成为平安城市未来信息安全防护的必然趋势。 相似文献
975.
Timothy Gottwald Gavin Poole Earl Taylor Weiqi Luo Drew Posny Scott Adkins William Schneider Neil McRoberts 《Entropy (Basel, Switzerland)》2020,22(11)
For millennia humans have benefitted from application of the acute canine sense of smell to hunt, track and find targets of importance. In this report, canines were evaluated for their ability to detect the severe exotic phytobacterial arboreal pathogen Xanthomonas citri pv. citri (Xcc), which is the causal agent of Asiatic citrus canker (Acc). Since Xcc causes only local lesions, infections are non-systemic, limiting the use of serological and molecular diagnostic tools for field-level detection. This necessitates reliance on human visual surveys for Acc symptoms, which is highly inefficient at low disease incidence, and thus for early detection. In simulated orchards the overall combined performance metrics for a pair of canines were 0.9856, 0.9974, 0.9257 and 0.9970, for sensitivity, specificity, precision, and accuracy, respectively, with 1–2 s/tree detection time. Detection of trace Xcc infections on commercial packinghouse fruit resulted in 0.7313, 0.9947, 0.8750, and 0.9821 for the same performance metrics across a range of cartons with 0–10% Xcc-infected fruit despite the noisy, hot and potentially distracting environment. In orchards, the sensitivity of canines increased with lesion incidence, whereas the specificity and overall accuracy was >0.99 across all incidence levels; i.e., false positive rates were uniformly low. Canines also alerted to a range of 1–12-week-old infections with equal accuracy. When trained to either Xcc-infected trees or Xcc axenic cultures, canines inherently detected the homologous and heterologous targets, suggesting they can detect Xcc directly rather than only volatiles produced by the host following infection. Canines were able to detect the Xcc scent signature at very low concentrations (10,000× less than 1 bacterial cell per sample), which implies that the scent signature is composed of bacterial cell volatile organic compound constituents or exudates that occur at concentrations many fold that of the bacterial cells. The results imply that canines can be trained as viable early detectors of Xcc and deployed across citrus orchards, packinghouses, and nurseries. 相似文献
976.
为防止非法用户在公安现场勘验信息系统中录入或修改现场勘验信息内容,系统采用数字签名提供信息的防冒充、防篡改等服务,以保证勘验信息的真实性和系统的安全性。论文通过对系统功能设计以及对与系统相关数字签名算法的分析和应用,从而使系统成为一个高效、安全且易用的信息系统。 相似文献
977.
针对固定维数的格基委托算法或格上基于盆景树生成的代理签名方案中私钥和签名的长度均过大的问题,提出一种较小尺寸的代理签名方案。该方案对随机预言机进行了合并优化,并使用一个更小范数但是向量盲化的消息,从而控制代理签名私钥的维数,其安全性基于格上最短向量问题和小整数解问题的困难性,并且满足代理签名方案所有的安全性要求。与现有方案相比,该方案有效地减小了代理签名私钥和代理签名的长度,使代理私钥长度与原始签名用户私钥长度相当。 相似文献
978.
979.
近些年来伪基站垃圾短信的泛滥是导致垃圾短信无法根治的重要原因。与目前普遍采取的单独从终端或者网络一侧对伪基站垃圾短信进行防治的方法相比,本文提出了一种终端和业务两侧协同的防治方法,通过业务侧对端口类短信进行数字签名和在终端侧进行验证,在不影响用户短信业务体验的前提下,在智能终端上实现了对伪基站所发送端口类短信的100%的识别和拦截。 相似文献
980.
Yuwei Xu 《International Journal of Communication Systems》2014,27(12):3676-3692
As an important component of intelligent transportation systems, vehicular ad hoc networks can provide safer and more comfortable driving circumstance for the drivers. However, communication security and privacy issues present practical concerns to the deployment of vehicular ad hoc networks. Although recent related studies have already addressed most of these issues, most of them have only considered a posteriori countermeasures or a priori countermeasures to prevent the attacks of an adversary. To the best of our knowledge, up to now, only two privacy‐preserving authentication schemes can provide a posteriori countermeasures and a priori countermeasures. But, the computational cost of verifying a signature is relatively high or security proof of the scheme is loose in the two schemes. In this paper, we propose two novel privacy‐preserving authentication schemes. The first one cannot only provide a posteriori and a priori countermeasures, but also has low computational cost in the verification phase and tight security proof. The second one can achieve batch verification on multiple messages. Comparison with Wu et al.'s scheme and Chen et al's scheme, our scheme shows higher efficiency in terms of the computational cost of verifying signature.Copyright © 2013 John Wiley & Sons, Ltd. 相似文献