首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   858篇
  免费   160篇
  国内免费   16篇
化学   3篇
综合类   8篇
数学   134篇
物理学   219篇
无线电   670篇
  2024年   3篇
  2023年   11篇
  2022年   28篇
  2021年   30篇
  2020年   35篇
  2019年   17篇
  2018年   20篇
  2017年   30篇
  2016年   35篇
  2015年   28篇
  2014年   37篇
  2013年   41篇
  2012年   66篇
  2011年   71篇
  2010年   52篇
  2009年   67篇
  2008年   68篇
  2007年   60篇
  2006年   71篇
  2005年   51篇
  2004年   41篇
  2003年   22篇
  2002年   45篇
  2001年   20篇
  2000年   28篇
  1999年   17篇
  1998年   11篇
  1997年   13篇
  1996年   7篇
  1995年   3篇
  1994年   1篇
  1993年   2篇
  1992年   1篇
  1988年   1篇
  1980年   1篇
排序方式: 共有1034条查询结果,搜索用时 31 毫秒
21.
In a secret sharing scheme, some participants can lie about the value of their shares when reconstructing the secret in order to obtain some illicit benefit. We present in this paper two methods to modify any linear secret sharing scheme in order to obtain schemes that are unconditionally secure against that kind of attack. The schemes obtained by the first method are robust, that is, cheaters are detected with high probability even if they know the value of the secret. The second method provides secure schemes, in which cheaters that do not know the secret are detected with high probability. When applied to ideal linear secret sharing schemes, our methods provide robust and secure schemes whose relation between the probability of cheating and the information rate is almost optimal. Besides, those methods make it possible to construct robust and secure schemes for any access structure.  相似文献   
22.
A new modified remote user authentication scheme using smart cards   总被引:1,自引:0,他引:1  
In 2000, a remote user authentication scheme using smart cards was proposed and the masquerade attacks were proved successful on this scheme. Recently, Kumar has suggested the idea of check digits to overcome the above attacks with a new scheme that removes these threats well. In this paper it is pointed out that the weakness still exists in Kumar's scheme, and the intruder can login to the remote system through having some information. A new scheme which can overcome these attacks and appears more secure and efficient than Kumar's is presented.  相似文献   
23.
王滨  陈思  陈加栋  王星 《通信学报》2021,(2):177-186
物联网设备因资源受限,需要兼具安全性、灵活性的轻量级密码模块保障安全,白盒密码能够满足物联网设备的安全需求.在常见的白盒密码实现方法中,往往密钥和查找表是绑定的,因此每次更换密钥都需要重新生成并更换查找表,这在实际应用中不够灵活.为了解决该问题,提出了一种基于AES的动态白盒实现方法,即DWB-AES.该方法通过改变轮...  相似文献   
24.
The Visual multi-secret sharing (VMSS) scheme is characterized by encoding several secret images into a set of noise-like shares. Most existing VMSS meth- ods have to distort shares to embed additional secret im- ages. As a result, the quality of the decoded original secret image is degraded. This paper proposes a folding-up op- eration based VMSS scheme, which is able to encode one secret image and a group of tag images into shares. The secret image is revealed by stacking all shares, and fold- ing up each chosen share discloses the tag image. The proposed scheme encodes tag images without affecting the quality of the reconstructed secret image. The quality of the decoded secret image is equal to that of the conven- tional Visual secret sharing (VSS) scheme. The superiority of the proposed method is experimental verified.  相似文献   
25.
26.
From the perspective of information theory and cryptography, the security of two quantum dialogue protocols and a bidirectional quantum secure direct communication (QSDC) protocol was analyzed, and it was pointed out that the transmitted information would be partly leaked out in them. That is, any eavesdropper can elicit some information about the secrets from the public annunciations of the legal users. This phenomenon should have been strictly forbidden in a quantum secure communication. In fact, this problem exists in quite a few recent proposals and, therefore, it deserves more research attention in the following related study. Supported by the National High Technology Research and Development Program of China (Grant No. 2006AA01Z419), the National Natural Science Foundation of China (Grant Nos. 90604023 and 60373059), the National Research Foundation for the Doctoral Program of Higher Education of China (Grant No. 20040013007), the National Laboratory for Modern Communications Science Foundation of China (Grant No. 9140C1101010601), the Natural Science Foundation of Beijing (Grant No. 4072020) and the ISN Open Foundation  相似文献   
27.
In 1994, Naor and Shamir introduced an unconditionally secure method for encoding black and white images. This method, known as a threshold visual cryptography scheme (VCS), has the benefit of requiring no cryptographic computation on the part of the decoders. In a -VCS, a share, in the form of a transparency, is given to ">n users. Any ">k users can recover the secret simply by stacking transparencies, but ">k-1 users can gain no information about the secret whatsoever.In this paper, we first explore the issue of contrast, by demonstrating that the current definitions are inadequate, and by providing an alternative definition. This new definition motivates an examination of minimizing pixel expansion subject to fixing the VCS parameters ">h and ">l. New bounds on pixel expansion are introduced, and connections between these bounds are examined. The best bound presented is tighter than any previous bound. An analysis of connections between (2, ">n) schemes and designs such as BIBD's, PBD's, and (">r, )-designs is performed. Also, an integer linear program is provided whose solution exactly determines the minimum pixel expansion of a (2, ">n)-VCS with specified ">h and >l.  相似文献   
28.

This paper is concerned with algorithms for computing in the divisor class group of a nonsingular plane curve of the form which has only one point at infinity. Divisors are represented as ideals, and an ideal reduction algorithm based on lattice reduction is given. We obtain a unique representative for each divisor class and the algorithms for addition and reduction of divisors run in polynomial time. An algorithm is also given for solving the discrete logarithm problem when the curve is defined over a finite field.

  相似文献   

29.
本文基于椭圆曲线上的双线性对性质,提出了一个基于身份的带凭证部分委托代理多重签名方案,该方案具有强不可伪造性、强不可否认性、强可识别性和预防误用性.  相似文献   
30.
一种基于指纹的身份认证协议   总被引:5,自引:0,他引:5  
提出一种基于指纹的身份认证协议,它对stolen-verifier(攻击者使用从认证服务器中盗窃的用户指纹信息冒充合法用户)和重发攻击 (Replay Attack)[1]是安全的,保证了用户指纹信息的保密性和真实性。认证用户可以从中获得的最大好处就是:当他们登录服务系统时,他们不需要除了指纹以外的其它任何东西。1  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号