全文获取类型
收费全文 | 1236篇 |
免费 | 145篇 |
国内免费 | 8篇 |
专业分类
化学 | 47篇 |
综合类 | 21篇 |
数学 | 64篇 |
物理学 | 65篇 |
无线电 | 1192篇 |
出版年
2024年 | 1篇 |
2023年 | 18篇 |
2022年 | 20篇 |
2021年 | 18篇 |
2020年 | 40篇 |
2019年 | 31篇 |
2018年 | 37篇 |
2017年 | 63篇 |
2016年 | 52篇 |
2015年 | 55篇 |
2014年 | 96篇 |
2013年 | 76篇 |
2012年 | 102篇 |
2011年 | 84篇 |
2010年 | 65篇 |
2009年 | 76篇 |
2008年 | 90篇 |
2007年 | 59篇 |
2006年 | 64篇 |
2005年 | 64篇 |
2004年 | 49篇 |
2003年 | 54篇 |
2002年 | 36篇 |
2001年 | 25篇 |
2000年 | 25篇 |
1999年 | 21篇 |
1998年 | 31篇 |
1997年 | 17篇 |
1996年 | 11篇 |
1995年 | 5篇 |
1994年 | 2篇 |
1991年 | 1篇 |
1984年 | 1篇 |
排序方式: 共有1389条查询结果,搜索用时 9 毫秒
41.
42.
43.
Holographic watermarking for authentication of cut images 总被引:3,自引:0,他引:3
Giuseppe Schirripa Spagnolo Michele De Santis 《Optics and Lasers in Engineering》2011,49(12):1447-1455
A watermarking technique, with a Computer Generated Hologram (CGH) coding system of the mark, is introduced and tested. The CGH watermarking can be used to authenticate parts of the original image. The hologram of the mark is embedded in the spatial domain by a blind additive embedding technique. The use of holography allows authenticating cuts of the original image, is the major novelty of this paper. The proposed methodology is characterized as an authentication technique, since it does not rely on the original image to decide whether the watermarked image has been altered or not and at the same time it is able to detect and localize any possible malicious change. Asymmetric cryptography is used to hide the hash information in an unambiguous way (non-repudiation property). 相似文献
44.
45.
利用两粒子纠缠态作为经典信息的载体,结合Hash函数和量子本地操作提出了一种可以实现双向认证功能的量子秘密共享方案,并且分析了它的安全性. 这种方案的安全性基于秘密共享双方的认证密钥和传输过程中粒子排列次序的保密. 若不考虑认证和窃听检测所消耗的粒子,平均1个Bell态共享2 bit经典信息.
关键词:
量子秘密共享
认证密钥
量子双向认证
两粒子量子纠缠 相似文献
46.
Huan Yang Ying Zhou Pingtian Yu Yaya Yang Zhaoqun Jiao James P. Tam 《Natural product research》2019,33(9):1251-1256
A novel PCR technology was developed to detect short DNA fragments using species-specific primers for rapid and non-sequencing authentication of Bombyx batryticatus based on differences in the mitochondrial genome. Three specifically designed primer reactions were established to target species for the reliable identification of their commercial products. They were confirmed to have a high inter-species specificity and intra-species stability. The limit of detection was estimated as 1 ng of genomes for Beauveria bassiana and 100 pg for Bombyx mori and Metarhizium anisopliae. Furthermore, validation results demonstrated that raw materials and their processed products can be conveniently authenticated with good sensitivity and precision using this newly proposed approach. In particular, when counterfeits were assayed, these primer sets performed well, whereas COI barcoding technology did not. These could also assist in the discrimination and identification of adulterates of other animal-derived medicines in their pulverized and processed forms and even in complexes. 相似文献
47.
We investigate the design of anonymous voting protocols,CV-based binary-valued ballot and CV-based multi-valued ballot with continuous variables(CV) in a multi-dimensional quantum cryptosystem to ensure the security of voting procedure and data privacy.The quantum entangled states are employed in the continuous variable quantum system to carry the voting information and assist information transmission,which takes the advantage of the GHZ-like states in terms of improving the utilization of quantum states by decreasing the number of required quantum states.It provides a potential approach to achieve the efficient quantum anonymous voting with high transmission security,especially in large-scale votes. 相似文献
48.
分析了现有网格安全体系结构模型存在的问题,结合网格固有的特点设计了一个网格环境下的认证模型,该模型以虚拟组织和信任域为基础,针对域内和域间环境采用不同的认证策略并且引入了临时安全域(TSD)的概念,通过分析表明该模型在提供安全身份鉴别的同时简化了实体之间的认证,满足网格环境的安全需求。 相似文献
49.
50.
LI Hui YANG Yi-xianInformation Security Center Beijing University of Posts Telecommunications Beijing P.R. China National Key Lab Beijing University of Posts Telecommunications Beijing P.R. China 《中国邮电高校学报(英文版)》2005,12(3)
1 Introduction TETRAsystemis a unified standard-based open sys-tem designed by European Telecommunications Stan-dards Institute(ETSI) in association with user organiza-tions, manufacturers ,testing and government authori-ties to satisfythe mobile communicationrequirements ofthe specialized institutions in all the European coun-tries .[1 ~4]A TETRAsystem supports many functionsonthe security field, which include authentication,airinterface encryption and end-to-end encryption.The au-then… 相似文献