首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   181篇
  免费   6篇
化学   5篇
数学   68篇
物理学   11篇
无线电   103篇
  2024年   1篇
  2023年   4篇
  2022年   8篇
  2021年   3篇
  2020年   8篇
  2019年   3篇
  2018年   5篇
  2017年   4篇
  2016年   9篇
  2015年   5篇
  2014年   13篇
  2013年   13篇
  2012年   5篇
  2011年   6篇
  2010年   11篇
  2009年   11篇
  2008年   4篇
  2007年   5篇
  2006年   15篇
  2005年   9篇
  2004年   3篇
  2003年   4篇
  2002年   7篇
  2001年   1篇
  2000年   2篇
  1999年   5篇
  1998年   3篇
  1997年   4篇
  1996年   3篇
  1995年   1篇
  1994年   1篇
  1993年   3篇
  1992年   2篇
  1991年   2篇
  1989年   1篇
  1981年   1篇
  1979年   1篇
  1978年   1篇
排序方式: 共有187条查询结果,搜索用时 15 毫秒
41.
自移动代理提出以来,安全性问题一直是制约其广泛应用的一个最主要的因素。作为分布式C/S计算模式的延伸,目前备受关注的多移动代理协作为提高整个移动代理系统安全性提供了一个新的思路。该文通过分析基于拉格朗日插值的密钥分割和多重签名方案应用于多移动代理系统中出现的问题,给出了一个改进的、更有实际应用价值的算法。最后,给出了一个基于此算法的电子交易的案例。  相似文献   
42.
一种完整的非对称公钥叛逆者追踪方案   总被引:2,自引:0,他引:2  
利用不经意多项式估值协议,该文提出了一种新的非对称公钥叛逆者追踪方案。当参与共谋的叛逆者数量不超过预先设置的范围时,与现有的非对称公钥追踪方案相比,该方案能够以完全的黑盒子追踪方式准确地确定出全部叛逆者;借助于密钥更新,该方案具有完善的撤销性,能够撤销任意数量的叛逆者。此外,与已有方案相比该方案显著降低了追踪时的计算量并且有着更高的传输效率。  相似文献   
43.
当前的量子秘密共享(QSS)存在资源制备开销较大、安全性不强的问题,该文提出一种基于正交乘积态的可验证量子秘密共享方案弥补上述不足,且多方成员能动态地加入或退出秘密共享。该方案将正交乘积态的粒子分成两个序列,第1个序列在多个参与者之间传输,前一个参与者对其执行嵌入份额值的酉算子后传输给下一个参与者,直到全部份额聚合完成;对于另一个序列,只有最后一个参与者(验证者)对接收到的粒子执行Oracle算子。然后,验证者对两个序列中的粒子对执行全局测量,得到秘密值的平方剩余。最后,借鉴Rabin密码中密文与明文之间非单一映射的思想,验证者联合Alice验证测量结果的正确性,并从测量结果确定出秘密值。安全性分析表明,该方案能抵抗常见的外部攻击和内部攻击,且验证过程具有强安全性;由于非局域性正交乘积态以两个序列分开传输,因此增强了秘密重构过程的安全性。性能分析表明,该方案使用正交乘积态作为信息载体,量子资源开销较小,且将正交乘积基的维度从低维拓展到d维,参与者人数能动态地增加和减少,使得方案具有更好的灵活性和通用性。  相似文献   
44.
45.
How to share a secret with cheaters   总被引:1,自引:0,他引:1  
This paper demonstrates that Shamir's scheme [10] is not secure against certain forms of cheating. A small modification to his scheme retains the security and efficiency of the original, is secure against these forms of cheating, and preserves the property that its security does not depend on any unproven assumptions such as the intractability of computing number-theoretic functions.This material is based in part upon work supported by the National Science Foundation under Grant Nos. DCR-8301212 and DCR-8352093. Part of the work was performed while the second author was a visitor at the IBM Thomas J. Watson Research Center.  相似文献   
46.
Within the economic order quantity (EOQ) framework, the main purpose of this paper is to investigate the retailer’s optimal replenishment policy under permissible delay in payments. All previously published articles dealing with optimal order quantity with permissible delay in payments assumed that the supplier only offers the retailer fully permissible delay in payments if the retailer ordered a sufficient quantity. Otherwise, permissible delay in payments would not be permitted. However, in this paper, we want to extend this extreme case by assuming that the supplier would offer the retailer partially permissible delay in payments when the order quantity is smaller than a predetermined quantity. Under this condition, we model the retailer’s inventory system as a cost minimization problem to determine the retailer’s optimal inventory cycle time and optimal order quantity. Three theorems are established to describe the optimal replenishment policy for the retailer. Some previously published results of other researchers can be deduced as special cases. Finally, numerical examples are given to illustrate all these theorems and to draw managerial insights.  相似文献   
47.
Conventional secret image sharing schemes, which are constructed based on Shamir’s method, often suffer from random-liked shares, lossy reconstruction and high computation complexity. In addition, their generated shares are generally in original image format which may lead to more storage and suspicion from invaders. In this paper, we propose a user-friendly secret image sharing scheme based on block truncation coding (BTC) and error diffusion, where meaningful shares can be directly generated without any extra process. The meaningful shares by the proposed scheme are in BTC-compressed format which can reduce the capacity of transfer and storage. In the reconstructing phase, the secret image can be losslessly reconstructed by performing XOR operations on bit planes of sufficient BTC-compressed shares. Further, the proposed scheme provides extra verification ability to identify cheaters and check false shares. Theoretical analysis and simulation results demonstrate the feasibility of the proposed scheme.  相似文献   
48.
Encrypted image-based reversible data hiding (EIRDH) is a well-known method allowing that (1) the image provider gives the data hider an encrypted image, (2) the data hider embeds the secret message into it to generate the encrypted image with the embedded secret message to the receiver, and (3) finally the receiver can extract the message and recover the original image without encryption. In the literature, the data hider and image provider must be specific parties who know the shared key with the receiver in traditional encrypted image-based reversible data hiding. In this paper, we propose an encrypted signal-based reversible data hiding (ESRDH) with public key cryptosystem, not only for images. The proposed scheme is secure based on Paillier homomorphic encryption. Finally, the experimental results show that the proposed scheme has much payload and high signal quality.  相似文献   
49.
Executive summary In the CEN/STAR Trends Analysis workshop on Sampling, initiated by request of the Nordic Innovation Centre, specially invited experts provided presentations on demands about regulation concerning sampling quality, sampling standard developments, quality assurance systems and practical experience from different sampling situations and cases. The workshop arrived at recommendations on the importance of proper sampling for environmental and product control purposes, especially to support European regulations, trade agreements and monitoring of environment. Sampling is an integrated part of the whole measurement process and should therefore be especially considered from the viewpoint of the end-user of the results. There is a need for raising quality control issues in sampling and for the establishment of a more uniformly co-ordinated European quality system for sampling. With the standard methods available, there are in principle two different ways of achieving third party assessment of the sampling protocols and procedures: accreditation of sampling organisations based upon international, national, or in-house standards and methods, and certification of individual samplers’ competences for sampling. Several activities or efforts as well as research and standardisation needs for raising the quality issues in sampling were identified and presented in a paper by the workshop.All the presentations and Workshop Proceedings are electronically available on the Nordic Innovation Centre's web site at and more specifically at  相似文献   
50.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号