全文获取类型
收费全文 | 494篇 |
免费 | 64篇 |
国内免费 | 1篇 |
专业分类
化学 | 10篇 |
力学 | 14篇 |
综合类 | 10篇 |
数学 | 50篇 |
物理学 | 26篇 |
无线电 | 449篇 |
出版年
2024年 | 2篇 |
2023年 | 7篇 |
2022年 | 10篇 |
2021年 | 12篇 |
2020年 | 13篇 |
2019年 | 16篇 |
2018年 | 9篇 |
2017年 | 16篇 |
2016年 | 23篇 |
2015年 | 17篇 |
2014年 | 33篇 |
2013年 | 18篇 |
2012年 | 38篇 |
2011年 | 22篇 |
2010年 | 24篇 |
2009年 | 30篇 |
2008年 | 22篇 |
2007年 | 34篇 |
2006年 | 30篇 |
2005年 | 22篇 |
2004年 | 22篇 |
2003年 | 26篇 |
2002年 | 16篇 |
2001年 | 11篇 |
2000年 | 13篇 |
1999年 | 3篇 |
1998年 | 13篇 |
1997年 | 12篇 |
1996年 | 7篇 |
1995年 | 6篇 |
1994年 | 7篇 |
1993年 | 3篇 |
1992年 | 5篇 |
1991年 | 1篇 |
1990年 | 3篇 |
1989年 | 3篇 |
1988年 | 3篇 |
1987年 | 3篇 |
1986年 | 1篇 |
1984年 | 1篇 |
1983年 | 1篇 |
1981年 | 1篇 |
排序方式: 共有559条查询结果,搜索用时 0 毫秒
71.
A finite element method for solution of the stream function formulation of Stokes flow is developed. The method involves complete cubic non-conforming (C0) triangular Hermite elements. This element fails the patch test. To correct the element and produce a convergent method we employ a penalty method to weakly enforce the desired continuity constraint on the normal derivative across the inter-element boundaries. Successful use of the method is demonstrated to require reduced integration of the inter-element penalty with a 1-point Gauss rule. Error estimates relate the optimal choice of penalty parameter to mesh size and are corroborated by numerical convergence studies. The need for reduced integration is interpreted using rank relations for an associated hybrid method. 相似文献
72.
信源平衡编码及其在流密码中的应用 总被引:1,自引:0,他引:1
本文对离散无记忆信源给出了一种编码方法,它使编码后信源输出有着最好的平衡性,即0与1的数目最大程度地接近.对等长编码,本文给出的方法是步优的;对基于Huffman码的平衡编码,在保持平均码长不变的情况下,本文给出的方法使0与1的平衡性达到最优.因为一般信源字符的频率是一个统计数字.这里的平衡性也是从统计角度来说的.最后我们还讨论了这种平衡编码对流密码中的非线性组合器在防止相关攻击方面的防护作用. 相似文献
73.
74.
Bent函数在流密码中的应用 总被引:9,自引:0,他引:9
本文利用频谱方法研究了Bent函数在流密码中的应用,指出Bent函数具有最高的非线性度,用它作非线性组合器中的组合函数不但可很好地抗相关攻击,而且可最大程度地抗最佳线性逼近攻击。本文还对Bent函数进行了改造以满足平衡性等要求。 相似文献
75.
介绍了黄石广电在数字化整转后,采用UT斯达康Rolling Stream系统,基于HFC+IPQAM方式建立互动电视平台的实践过程. 相似文献
76.
Jong Hyuk Park 《International Journal of Communication Systems》2009,22(8):959-969
mCrypton, which is a mini‐version of Crypton, is a 64‐bit block cipher with three key size options (64 bits, 96 bits, 128 bits). It was designed for use in low‐cost ubiquitous wireless devices and resource‐constrained tiny devices such as low‐cost Radio‐Frequency Identification tags and sensors in Ubiquitous Sensor Network. In this paper we show that 8‐round mCrypton with 128‐bit key is vulnerable to related‐key rectangle attack. We first describe how to construct two related‐key truncated differentials on which 7‐round related‐key rectangle distinguisher is based and then we exploit it to attack 8‐round mCrypton. This attack requires 246 dada and 246 time complexities, which is faster than exhaustive search. This is the first known cryptanalytic result on mCrypton. Copyright © 2009 John Wiley & Sons, Ltd. 相似文献
77.
In this paper, we study an E0-like combiner with memory as the keystream generator. First, we formulate a systematic and simple
method to compute correlations of the FSM output sequences (up to certain bits). An upper bound of the correlations is given,
which is useful to the designer. Second, we show how to build either a uni-bias-based or multi-bias-based distinguisher to
distinguish the keystream produced by the combiner from a truly random sequence, once correlations are found. The data complexity
of both distinguishers is carefully analyzed for performance comparison. We show that the multi-bias-based distinguisher outperforms
the uni-bias-based distinguisher only when the patterns of the largest biases are linearly dependent. The keystream distinguisher
is then upgraded for use in the key-recovery attack. The latter actually reduces to the well-known Maximum Likelihood Decoding
(MLD) problem given the keystream long enough. We devise an algorithm based on Fast Walsh Transform (FWT) to solve the MLD
problem for any linear code with dimension L and length n within time O(n+L⋅2
L
). Meanwhile, we summarize a design criterion for our E0-like combiner with memory to resist the proposed attacks. 相似文献
78.
79.
分析了国内外物联网安全政策、技术、标准、产业等形势,重点强调了当前我国物联网发展中存在的安全风险,包括大连接环境下的设备风险、物联网网络本身安全风险以及物联网上承载的各类应用安全风险,提出了打造以密码为核心的物联网安全体系,加速新技术在物联网安全的应用,以新基建为契机建立物联网领域安全设备泛在化部署新体系,以多层次立体式理念确保物联网安全,呼吁供给侧需求侧建立安全协同新机制,共同促进物联网产业安全可持续发展。 相似文献
80.
Seyyed Arash Azimi Siavash Ahmadi Zahra Ahmadian Javad Mohajeri Mohammad Reza Aref 《International Journal of Communication Systems》2018,31(1)
HIGHT is a lightweight block cipher introduced in CHES 2006 by Hong et al as a block cipher suitable for low‐resource applications. In this paper, we propose improved impossible differential and biclique attacks on HIGHT block cipher both exploiting the permutation‐based property of the cipher's key schedule algorithm as well as its low diffusion. For impossible differential attack, we found a new 17‐round impossible differential characteristic that enables us to propose a new 27‐round impossible differential attack. The total time complexity of the attack is 2120.4 where an amount of 259.3 chosen plaintext‐ciphertext pairs and 2107.4 memory are required. We also instantiate a new biclique cryptanalysis of HIGHT, which is based on the new idea of splitting each of the forward and backward keys into 2 parts where the computations associated to each one are performed independently. The time complexity and data complexity of this attack are 2125.7 and 242, respectively. To the best of our knowledge, this is the fastest biclique attack on full‐round HIGHT. 相似文献