全文获取类型
收费全文 | 1477篇 |
免费 | 193篇 |
国内免费 | 62篇 |
专业分类
化学 | 105篇 |
力学 | 6篇 |
综合类 | 8篇 |
数学 | 177篇 |
物理学 | 766篇 |
无线电 | 670篇 |
出版年
2024年 | 3篇 |
2023年 | 12篇 |
2022年 | 30篇 |
2021年 | 32篇 |
2020年 | 51篇 |
2019年 | 25篇 |
2018年 | 33篇 |
2017年 | 33篇 |
2016年 | 48篇 |
2015年 | 37篇 |
2014年 | 56篇 |
2013年 | 63篇 |
2012年 | 82篇 |
2011年 | 123篇 |
2010年 | 73篇 |
2009年 | 107篇 |
2008年 | 111篇 |
2007年 | 120篇 |
2006年 | 129篇 |
2005年 | 86篇 |
2004年 | 64篇 |
2003年 | 53篇 |
2002年 | 72篇 |
2001年 | 52篇 |
2000年 | 51篇 |
1999年 | 39篇 |
1998年 | 40篇 |
1997年 | 23篇 |
1996年 | 17篇 |
1995年 | 9篇 |
1994年 | 10篇 |
1993年 | 5篇 |
1992年 | 7篇 |
1991年 | 5篇 |
1990年 | 1篇 |
1989年 | 3篇 |
1988年 | 4篇 |
1987年 | 3篇 |
1986年 | 6篇 |
1985年 | 3篇 |
1984年 | 4篇 |
1983年 | 1篇 |
1982年 | 1篇 |
1981年 | 1篇 |
1980年 | 1篇 |
1979年 | 2篇 |
1974年 | 1篇 |
排序方式: 共有1732条查询结果,搜索用时 15 毫秒
81.
D. d'Enterria 《The European Physical Journal A - Hadrons and Nuclei》2007,31(4):816-823
We present a summary of the physics of gluon saturation and non-linear QCD evolution at small values of the parton momentum
fraction x in the proton and nucleus in the context of recent experimental results at HERA and RHIC. The rich physics potential of low-x studies at the LHC, especially in the forward region, is discussed and some benchmark measurements in pp, pA and AA collisions are introduced. 相似文献
82.
83.
84.
采用复合武硬件设计方法,通过数学公式推导和电路结构设计,完成了一款GF(2m)域椭圆曲线密码处理器的高效VLSI实现。以低成本为目标,对算术逻辑模块的乘法、约减、平方、求逆,以及控制电路模块都进行了优化设计。按照椭圆曲线密码的不同运算层次,设计了不同层次的控制电路。该处理器综合在中芯国际SMIC0.18μm标准工艺库上.比相关研究的芯片面积节省48%,同时保证了很快的速度。 相似文献
85.
文章分析了仅适用于特征为2和3的域上的一种椭圆曲线求阶算法—Madsen求阶算法,并对此算法进行了改进和推广,提高了Madsen算法的运算速度。 相似文献
86.
87.
By analyzing existed Internet of Things' system security vulnerabilities, a security architecture on trusting one is constructed. In the infrastructure, an off-line identity authentication based on the combined public key (CPK) mechanism is proposed, which solves the problems about a mass amount of authentications and the cross-domain authentication by integrating nodes' validity of identity authentication and uniqueness of identification. Moreover, the proposal of constructing nodes' authentic identification, valid authentication and credible communication connection at the application layer through the perception layer impels the formation of trust chain and relationship among perceptional nodes. Consequently, a trusting environment of the Internet of Things is built, by which a guidance of designing the trusted one would be provided. 相似文献
88.
This paper presents a method for differential collision attack of reduced FOX block cipher based on 4-round distinguishing property. It can be used to attack 5, 6 and 7-round FOX64 and 5-round FOX128. Our attack has a precomputation phase, but it can be obtained before attack and computed once for all. This attack on the reduced to 4-round FOX64 requires only 7 chosen plaintexts, and performs 242 .84-round FOX64 encryptions. It could be extended to 5 (6, 7)-round FOX64 by a key exhaustive search behind the fourth round. The time complexities of 5, 6 and 7-round FOX64 are approximate to 2106 .8, 2170 .8and 2234 .8, respectively. The attack on reduced FOX128 demands 11 chosen plain-texts, requires 2192one round encryptions in precomputation, performs approximately 276 .5 one round encryptions on 4-round FOX128, and is 2204 .5against 5-round FOX128. 相似文献
89.
To protect against algebraic attacks, a high algebraic immunity is now an important criterion for Boolean functions used in stream ciphers. In this paper, a new method based on a univariate polynomial representation of Boolean functions is proposed. The proposed method is used to construct Boolean functions with an odd number of variables and with maximum algebraic immunity. We also discuss the nonlinearity of the constructed functions. Moreover, a lower bound is determined for the number of Boolean functions with maximum algebraic immunity. 相似文献
90.
We investigate the design of anonymous voting protocols,CV-based binary-valued ballot and CV-based multi-valued ballot with continuous variables(CV) in a multi-dimensional quantum cryptosystem to ensure the security of voting procedure and data privacy.The quantum entangled states are employed in the continuous variable quantum system to carry the voting information and assist information transmission,which takes the advantage of the GHZ-like states in terms of improving the utilization of quantum states by decreasing the number of required quantum states.It provides a potential approach to achieve the efficient quantum anonymous voting with high transmission security,especially in large-scale votes. 相似文献