全文获取类型
收费全文 | 490篇 |
免费 | 68篇 |
国内免费 | 1篇 |
专业分类
化学 | 10篇 |
力学 | 14篇 |
综合类 | 10篇 |
数学 | 50篇 |
物理学 | 26篇 |
无线电 | 449篇 |
出版年
2024年 | 2篇 |
2023年 | 7篇 |
2022年 | 10篇 |
2021年 | 12篇 |
2020年 | 13篇 |
2019年 | 16篇 |
2018年 | 9篇 |
2017年 | 16篇 |
2016年 | 23篇 |
2015年 | 17篇 |
2014年 | 33篇 |
2013年 | 18篇 |
2012年 | 38篇 |
2011年 | 22篇 |
2010年 | 24篇 |
2009年 | 30篇 |
2008年 | 22篇 |
2007年 | 34篇 |
2006年 | 30篇 |
2005年 | 22篇 |
2004年 | 22篇 |
2003年 | 26篇 |
2002年 | 16篇 |
2001年 | 11篇 |
2000年 | 13篇 |
1999年 | 3篇 |
1998年 | 13篇 |
1997年 | 12篇 |
1996年 | 7篇 |
1995年 | 6篇 |
1994年 | 7篇 |
1993年 | 3篇 |
1992年 | 5篇 |
1991年 | 1篇 |
1990年 | 3篇 |
1989年 | 3篇 |
1988年 | 3篇 |
1987年 | 3篇 |
1986年 | 1篇 |
1984年 | 1篇 |
1983年 | 1篇 |
1981年 | 1篇 |
排序方式: 共有559条查询结果,搜索用时 15 毫秒
101.
In this paper, the authors consider an approximation to the isentropic planar Magneto-hydrodynamics (MHD for short) equations by a kind of relaxed Euler-type
system. The approximation is based on the generalization of the Maxwell law for nonNewtonian fluids together with the Maxwell correction for the Amp`ere law, hence the
approximate system becomes a first-order quasilinear symmetrizable hyperbolic systems
with partial dissipation. They establish the global-in-time smooth solutions to the approximate Euler-type equations in a small neighbourhood of constant equilibrium states and
obtain the global-in-time convergence towards the isentropic planar MHD equations. In
addition, they also establish the global-in-time error estimates of the limit based on stream
function techniques and energy estimates for error variables. 相似文献
102.
GIFT,a lightweight block cipher proposed at CHES2017,has been widely cryptanalyzed this years.This paper studies the differential diffusion characteristics of round function of GIFT at first,and proposes a random nibble-based differential fault attack.The key recovery scheme is developed on the statistical properties we found for the differential distribution table of the S-box.A lot of experiments had been done and experimental results show that one round key can be retrieved with an average of 20.24 and 44.96 fault injections for GIFT-64 and GIFT-128 respectively.Further analysis shows that a certain number of fault injections recover most key bits.So we demonstrate an improved fault attack combined with the method of exhaustive search,which shows that the master key can be recovered by performing 216 and 217 computations and injecting 31 and 32 faults on an average for GIFT-64 and GIFT-128 respectively. 相似文献
103.
Two new families of finite binary sequences are constructed using multiplicative inverse. The sequences are shown to have strong pseudorandom properties by using some estimates of certain exponential sums over finite fields. The constructions can be implemented fast since multiplicative inverse over finite fields can be computed in polynomial time. 相似文献
104.
In this review paper, we first introduce the basic concept of quantum computer-resistant cryptography, which is the cornerstone of security technology for the network of a new era. Then, we will describe the positioning of mathematical cryptography and quantum cryptography, that are currently being researched and developed. Quantum cryptography includes QKD and quantum stream cipher, but we point out that the latter is expected as the core technology of next-generation communication systems. Various ideas have been proposed for QKD quantum cryptography, but most of them use a single-photon or similar signal. Then, although such technologies are applicable to special situations, these methods still have several difficulties to provide functions that surpass conventional technologies for social systems in the real environment. Thus, the quantum stream cipher has come to be expected as one promising countermeasure, which artificially creates quantum properties using special modulation techniques based on the macroscopic coherent state. In addition, it has the possibility to provide superior security performance than one-time pad cipher. Finally, we introduce detailed research activity aimed at putting the quantum stream cipher into practical use in social network technology. 相似文献
105.
In order to improve the transmission efficiency and security of image encryption, we combined a ZUC stream cipher and chaotic compressed sensing to perform image encryption. The parallel compressed sensing method is adopted to ensure the encryption and decryption efficiency. The ZUC stream cipher is used to sample the one-dimensional chaotic map to reduce the correlation between elements and improve the randomness of the chaotic sequence. The compressed sensing measurement matrix is constructed by using the sampled chaotic sequence to improve the image restoration effect. In order to reduce the block effect after the parallel compressed sensing operation, we also propose a method of a random block of images. Simulation analysis shows that the algorithm demonstrated better encryption and compression performance. 相似文献
106.
107.
ARIA密码是2003年由韩国学者提出的新的分组密码算法,该密码与AES的设计原理相类似,并在2004年被选为韩国的分组密码标准。该文根据ARIA密码的结构特征,提出ARIA密码的一种新的7轮不可能差分攻击路径,首次实现了对ARIA-192的不可能差分攻击,攻击的时间复杂度为2176.2。同时,利用扩散层的相关性质降低攻击ARIA-256的时间复杂度为2192.2。 相似文献
108.
109.
基于组播的流调度算法能够有效降低服务器和网络带宽消耗。但研究表明,在用户进行VCR交互操作情况下,这些算法的性能将急剧恶化。该文提出一种有效支持用户交互的视频点播系统流调度方案:常规组播固定调度RMFS。RMFS采用基于请求类的接纳控制策略,并通过流合并机制来合并单播流。分析了RMFS方案的最佳组播间隔、最佳请求阈值和最小服务器容量需求。仿真结果验证了分析模型的正确性和RMFS方案的可行性。 相似文献
110.