首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1596篇
  免费   225篇
  国内免费   4篇
化学   11篇
力学   39篇
综合类   12篇
数学   82篇
物理学   404篇
无线电   1277篇
  2024年   10篇
  2023年   39篇
  2022年   66篇
  2021年   83篇
  2020年   68篇
  2019年   39篇
  2018年   49篇
  2017年   88篇
  2016年   63篇
  2015年   75篇
  2014年   166篇
  2013年   99篇
  2012年   103篇
  2011年   105篇
  2010年   77篇
  2009年   90篇
  2008年   96篇
  2007年   89篇
  2006年   90篇
  2005年   76篇
  2004年   46篇
  2003年   60篇
  2002年   21篇
  2001年   23篇
  2000年   21篇
  1999年   22篇
  1998年   18篇
  1997年   12篇
  1996年   12篇
  1995年   3篇
  1994年   2篇
  1993年   4篇
  1992年   6篇
  1991年   1篇
  1988年   1篇
  1981年   1篇
  1976年   1篇
排序方式: 共有1825条查询结果,搜索用时 15 毫秒
11.
一个新的具有指定接收者(t,n)门限签名加密方案   总被引:15,自引:1,他引:14  
提出了一个具有指定接收考验证的签名加密方案。该方案是数字签名与公钥密码体制的有机集成。与普通数字签名方案相比,除了具有认证性、数据完整性外还具有保密性和接收方的隐私性。然后又利用门限方案首次构造了一个(t,n)门限签名加密方案。该(t,n)门限签名方案具有数据传输安全、顽健性、通信代价更小、执行效率更高等特点。  相似文献   
12.
Some New Results on Key Distribution Patterns and Broadcast Encryption   总被引:1,自引:0,他引:1  
This paper concerns methods by which a trusted authority can distribute keys and/or broadcast a message over a network, so that each member of a privileged subset of users can compute a specified key or decrypt the broadcast message. Moreover, this is done in such a way that no coalition is able to recover any information on a key or broadcast message they are not supposed to know. The problems are studied using the tools of information theory, so the security provided is unconditional (i.e., not based on any computational assumption).In a recent paper st95a, Stinson described a method of constructing key predistribution schemes by combining Mitchell-Piper key distribution patterns with resilient functions; and also presented a construction method for broadcast encryption schemes that combines Fiat-Naor key predistribution schemes with ideal secret sharing schemes. In this paper, we further pursue these two themes, providing several nice applications of these techniques by using combinatorial structures such as orthogonal arrays, perpendicular arrays, Steiner systems and universal hash families.  相似文献   
13.
为平衡混沌映射中结构与性能的关系,保证加密系统安全性,提出一种基于余弦-指数混沌映射的分块图像加密算法。首先,通过非线性指数项对引入了Tent种子映射的余弦映射进行调制,构造新型余弦-指数混沌映射,并利用SHA-256函数产生与明文相关的密钥,生成随机性较强的混沌序列,实现一次一密;然后,基于拉丁方和位级转换,通过两轮拉丁方索引和比特位拼接,分别设计双重拉丁方和扩展比特位算法,并结合二维约瑟夫序列,对块间预置乱后的明文进行块内置乱,实现不同分块的差异化置乱;最后,基于Zig-Zag变换,采用环状仿Zig-Zag变换设计交叉Zig-Zag变换方法,将中间密文与混沌序列进行双向非线性扩散,实现同时改变像素位置与大小,完成图像加密。实验结果表明,该算法密钥空间大,能有效抵御差分分析和统计分析等典型攻击,具有较好的加密效果。  相似文献   
14.
A JPEG image encryption with the adaptive key and run consistency of MCUs is proposed. The chosen-plaintext attack (CPA) is given here on this encryption scheme. First, the adaptive key can be reproduced from the encrypted image, so that the plaintext images with the same adaptive key can be constructed. Second, the existence of run consistency of MCUs (RCM) between the original image and the encrypted image facilitates rapid estimation. In addition, the single swap for the runs of MCUs with RCM is designed for more accurate estimation. Detailed cryptanalytic results suggest that this encryption scheme can only be used to realize perceptual encryption but not to provide content protection for digital images. Furthermore, applications of the CPA to break other encryption schemes with RCM are presented.  相似文献   
15.
All-optical responsive nanomaterials, which can rapidly switch between two stable states, have been regarded as the next-generation memories due to their potential to realize binary information storage and implement on-chip, integrated photonic neuromorphic systems. Rare earth oxides are preeminent candidates owing to their extraordinary luminescent stability and narrow optical transitions. However, due to the lack of simple and effective optical switches, it is difficult to realize all-optical data storage, encoding, and retrieval by pure rare earth-doped luminescent nanoparticles. Here, a rapid and high-contrast of 104 luminescent switching of Y2O3:Eu3+ nanoparticle between the enhancement and quenching states is achieved by employing the strong light confinement and ultrafast thermal response of localized surface plasmon resonance. A self-encrypted all-optical memory is presented with optical information writing, encryption, reading, and re-writing, and a high-sensitivity synaptic response of emitters to frequency and light intensity flux, which can be harnessed to encrypt information flows and promote convenient and high-security information encryption. Such a convenient and secure plasmonic thermally assisted self-encrypting luminescent switch paves the way for constructing high-performance stimuli-responsive rare earth oxide crystals on demand and expanding their applications in various data encryption, anti-counterfeiting, and rewritable colouration devices.  相似文献   
16.
Nonvolatile organic photonic transistor (OPT) memories have attracted widespread attention due to their nondestructive readout, remote controllability, and robust tunability. Developing electrets with similar molecular structures but different memory behaviors and light-responsive features is crucial for light-wavelength-modulated data encryption. However, reported OPT memories have yet to meet this challenge. Here a new electret molecule (“H-PDI”) is developed via reconfiguring the linear perylene diimide molecule (“L-PDI”) to a helical shape. Respectively incorporating H-PDI and L-PDI into the floating gate layer results to H-PDI OPT and L-PDI OPT. Attributing to their remarkably different electronic structures and energy bandgaps, H-PDI OPT and L-PDI OPT preferably respond to 405 and 532 nm light irradiation, respectively. Upon electrical programming, data can be written and stored in both memories with good retention features and a high “1”/“0” state current ratio over 105, though the data can only be erased by light with correct wavelengths, rather than the electrical field. Moreover, data stored in a memory array consisting of both H-PDI OPT and L-PDI OPT can only be read out by correct inputs, and wrong inputs will lead to highly deceptive outputs. This study provides a general design strategy of OPT for advanced data encryption and protection.  相似文献   
17.
Structural color (SC) arising from a periodically ordered self-assembled block copolymer (BCP) photonic crystal (PC) is useful for reflective-mode sensing displays owing to its capability of stimuli-responsive structure alteration. However, a set of PC inks, each providing a precisely addressable SC in the full visible range, has rarely been demonstrated. Here, a strategy for developing BCP PC inks with tunable structures is presented. This involves solution-blending of two lamellar-forming BCPs with different molecular weights. By controlling the mixing ratio of the two BCPs, a thin 1D BCP PC film is developed with alternating in-plane lamellae whose periodicity varies linearly from ≈46 to ≈91 nm. Subsequent preferential swelling of one-type lamellae with either solvent or non-volatile ionic liquid causes the photonic band gap of the films to red-shift, giving rise to full-visible-range SC correlated with the pristine nanostructures of the blended films in both liquid and solid states. The BCP PC palette of solution-blended binary solutions is conveniently employed in various coating processes, allowing facile development of BCP SC on the targeted surface. Furthermore, full-color SC paintings are realized with their transparent PC inks, facilitating low-power pattern encryption.  相似文献   
18.
基于有限域GF上圆锥曲线的公钥密码算法   总被引:5,自引:0,他引:5       下载免费PDF全文
蔡永泉  赵磊  靳岩岩 《电子学报》2006,34(8):1464-1468
圆锥曲线密码学是一种新型的公钥密码学,迄今对圆锥曲线密码学的研究成果都是以有限域GF(p)上的圆锥曲线为基础的.本文将有限域GF(p)上的圆锥曲线C(GF(p))推广为有限域GF(2n)上的圆锥曲线C(GF(2n)),证明了圆锥曲线C(GF(2n))上的点和加法运算构成有限交换群(C(GF(2n)),),并给出了圆锥曲线群(C(GF(2n)),)的阶的计算.此外,提出了使用有限域GF(2n)上的圆锥曲线群构造公钥密码系统,并给出了ElGamal加密方案和数字签名算法(DSA)在圆锥曲线C(GF(2n))上模拟的算法,最后分析其安全性.  相似文献   
19.
基于能量量化的小波域数字音频水印算法   总被引:1,自引:0,他引:1  
利用混沌动力学系统中logistic映射先对水印图像进行置乱预处理以增强其鲁棒性,在小波域中将原始音频信号按比例分段,求得每段的能量然后将其按步长delta以及要嵌入的水印的值进行量化,然后用量化后的能量与量化前的能量之比乘以该段每一个值即完成一位水印的嵌入。反复执行以上步骤,完成全部水印的嵌入。若低频部分分组数大于水印序列个数则重复嵌入。采用StirMark for Audio攻击后的实验结果表明该方案对StirMark for Audio的部分攻击具有一定的鲁棒性。  相似文献   
20.
The dynamic string motion, which displacement is unilaterally constrained by the rigid termination condition of an arbitrary geometry has been simulated and analyzed. The treble strings of a grand piano usually terminate at a capo bar, which is situated above the strings. The apex of a V-shaped section of the capo bar defines the end of the speaking length of the strings. A numerical calculation based on the traveling wave solution is proposed for modeling the nonlinearity inducing interactions between the vibrating string and the contact condition at the point of string termination. It was shown that the lossless string vibrates in two distinct vibration regimes. In the beginning the string starts to interact in a nonlinear fashion with the rigid terminator, and the resulting string motion is aperiodic. Consequently, the spectrum of the string motion depends on the amplitude of string vibrations, and its spectral structure changes continuously with the passage of time. The duration of that vibration regime depends on the geometry of the terminator. After some time of aperiodic vibration, the string vibrations settle in a periodic regime where the resulting spectrum remains constant.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号