全文获取类型
收费全文 | 1165篇 |
免费 | 135篇 |
国内免费 | 8篇 |
专业分类
化学 | 43篇 |
综合类 | 20篇 |
数学 | 61篇 |
物理学 | 63篇 |
无线电 | 1121篇 |
出版年
2024年 | 1篇 |
2023年 | 15篇 |
2022年 | 14篇 |
2021年 | 15篇 |
2020年 | 36篇 |
2019年 | 30篇 |
2018年 | 35篇 |
2017年 | 61篇 |
2016年 | 44篇 |
2015年 | 49篇 |
2014年 | 92篇 |
2013年 | 70篇 |
2012年 | 95篇 |
2011年 | 78篇 |
2010年 | 63篇 |
2009年 | 72篇 |
2008年 | 84篇 |
2007年 | 58篇 |
2006年 | 62篇 |
2005年 | 61篇 |
2004年 | 49篇 |
2003年 | 51篇 |
2002年 | 35篇 |
2001年 | 25篇 |
2000年 | 25篇 |
1999年 | 21篇 |
1998年 | 31篇 |
1997年 | 17篇 |
1996年 | 11篇 |
1995年 | 5篇 |
1994年 | 2篇 |
1991年 | 1篇 |
排序方式: 共有1308条查询结果,搜索用时 281 毫秒
21.
22.
Advanced metering infrastructure (AMI) provides 2‐way communications between the utility and the smart meters. Developing authenticated key exchange (AKE) and broadcast authentication (BA) protocols is essential to provide secure communications in AMI. The security of all existing cryptographic protocols is based on the assumption that secret information is stored in the nonvolatile memories. In the AMI, the attackers can obtain some or all of the stored secret information from memories by a great variety of inexpensive and fast side‐channel attacks. Thus, all existing AKE and BA protocols are no longer secure. In this paper, we investigate how to develop secure AKE and BA protocols in the presence of memory attacks. As a solution, we propose to embed a physical unclonable function (PUF) in each party, which generates the secret values as required without the need to store them. By combining PUFs and 2 well‐known and secure protocols, we propose PUF‐based AKE and BA protocols. We show that our proposed protocols are memory leakage resilient. In addition, we prove their security in the standard model. Performance analysis of both protocols shows their efficiency for AMI applications. The proposed protocols can be easily implemented. 相似文献
23.
Rocío Fonseca-Aguiaga Walter M. Warren-Vega Floriberto Miguel-Cruz Luis A. Romero-Cano 《Molecules (Basel, Switzerland)》2021,26(6)
Isotopic ratios of δ13CVPDB and δ18OVSMOW have been used as an additional parameter to ensure the authenticity of the aging time of 100% agave tequila. For this purpose, 120 samples were isotopically analyzed (40 silver class, 40 aged class, and 40 extra-aged classes). The samples were obtained through a stratified sampling by proportional allocation, considering tequila producers from the main different regions of Jalisco, Mexico (Valles 41%, Altos Sur 31%, Cienega 16%, and Centro 12%). The results showed that the δ13CVPDB was found in an average of −12.85 ‰ for all the analyzed beverages, with no significant difference between them. Since for all the tested samples the Agave tequilana Weber blue variety was used as source of sugar to obtain alcohol, those results were foreseeable, and confirm the origin of the sugar source. Instead, the results for δ18OVSMOW showed a positive slope linear trend for the aging time (silver class 19.52‰, aged class 20.54‰, extra-aged class 21.45‰), which is associated with the maturation process, there are oxidation reactions that add congeneric compounds to the beverage, these can be used as tracers for the authenticity of the aging time. Additionally, the experimental data showed homogeneity in the beverages regardless of the production region, evidencing the tequila industry’s high-quality standards. However, a particular case occurs with the δ18OVSMOW data for the silver class samples, in which a clear trend is noted with the altitude of the region of origin; therefore, this information suggests that this analytical parameter could be useful to authenticate the regional origin of beverage. 相似文献
24.
Security becomes increasingly important in computing systems. Data integrity is of utmost importance. One way to protect data integrity is attaching an identifying tag to individual data. The authenticity of the data can then be checked against its tag. If the data is altered by the adversary, the related tag becomes invalid and the attack will be detected. The work presented in this paper studies an existing tag design (CETD) for authenticating memory data in embedded processor systems, where data that are stored in the memory or transferred over the bus can be tampered. Compared to other designs, this design offers the flexibility of trading-off between the implementation cost and tag size (hence the level of security); the design is cost effective and can counter the data integrity attack with random values (namely the fake values used to replace the valid data in the attack are random). However, we find that the design is vulnerable when the fake data is not randomly selected. For some data, their tags are not distributed over the full tag value space but rather limited to a much reduced set of values. When those values were chosen as the fake value, the data alteration would likely go undetected. In this article, we analytically investigate this problem and propose a low cost enhancement to ensure the full-range distribution of tag values for each data, hence effectively removing the vulnerability of the original design. 相似文献
25.
在无线传感器网络(WSNs)中,节点复制攻击和女巫攻击可扰乱数据融合和阈值选举等网络操作.发起这两种攻击需先通过邻居发现认证过程.考虑到在WSNs中发起邻居认证是不频繁的,提出了一种基于单向密钥链的ID认证防御机制(OKCIDA),降低攻击者在任何时间段发起这两种攻击的可能性.然后基于椭圆曲线离散对数问题,构造对称参数,并组合OKCIDA和利用节点邻居关系,提出了一种无需位置的邻居认证协议(LFNA),以阻止复制节点和女巫节点成功加入网络.最后给出了安全性证明和分析,并在安全和开销方面将LFNA与已有典型防御方案进行了比较,结果表明该方案具有一定的优势. 相似文献
26.
物联网中RFID技术的应用非常广泛,但是RFID系统的安全性却存在着很大隐患。在RFID系统中标签与读写器间的通信信道是最易受到攻击,传输数据的完整性与保密性得不到保障,因而需要加强RFID系统通信的安全机制。考虑到RFID系统的硬件条件与成本限制,需要建立一个适合RFID系统的安全认证协议,来解决在RFID系统中信息传输所遇到的安全问题。PRESENT算法是轻量级的分组加密算法,将PRESENT结合到RFID系统的安全认证协议中,形成了新的RFID安全认证协议PRSA(PRESENT based RFID security authentication)。此协议可以增强RFID系统的安全性而又不会占用过多的硬件资源,从而能够适用于低成本的RFID系统的通信安全。 相似文献
27.
28.
29.
30.