全文获取类型
收费全文 | 770篇 |
免费 | 45篇 |
国内免费 | 9篇 |
专业分类
化学 | 17篇 |
力学 | 7篇 |
综合类 | 11篇 |
数学 | 25篇 |
物理学 | 43篇 |
无线电 | 721篇 |
出版年
2024年 | 1篇 |
2023年 | 1篇 |
2022年 | 3篇 |
2021年 | 8篇 |
2020年 | 12篇 |
2019年 | 5篇 |
2018年 | 10篇 |
2017年 | 19篇 |
2016年 | 9篇 |
2015年 | 37篇 |
2014年 | 78篇 |
2013年 | 39篇 |
2012年 | 70篇 |
2011年 | 61篇 |
2010年 | 39篇 |
2009年 | 29篇 |
2008年 | 53篇 |
2007年 | 37篇 |
2006年 | 45篇 |
2005年 | 51篇 |
2004年 | 42篇 |
2003年 | 46篇 |
2002年 | 28篇 |
2001年 | 16篇 |
2000年 | 27篇 |
1999年 | 10篇 |
1998年 | 14篇 |
1997年 | 11篇 |
1996年 | 11篇 |
1995年 | 8篇 |
1994年 | 2篇 |
1993年 | 1篇 |
1991年 | 1篇 |
排序方式: 共有824条查询结果,搜索用时 875 毫秒
111.
112.
To solve the problem of the access keys stored in a smart card increasing linearly with the number of registered clouds without third party participated in authentication,an authentication scheme was proposed for multi-cloud environment based on smart card.In the proposed scheme,the authentication was realized between user and multiple clouds without third party participation when the smart card only stored two access key.Thus the storage cost of smart card was reduced effectively.Because there was no public key cryptography,the authentication messages was generated by using XOR homomorphic function and Hash function,thus the computational cost of the smart card and the cloud servers was reduced effectively.Moreover,the proposed scheme also didn’t need to store any user’s information on the cloud servers,thereby reducing the storage and management costs of the cloud servers.The security analysis and the performance analysis show that the proposed scheme is able to resist multiple attacks,which is secure and efficient. 相似文献
113.
作为"一卡通"的一个子系统,门禁系统早已超越了单纯的门道及钥匙管理,它已经逐渐发展成为一套完整的出入管理系统.本文对钢铁冶金企业中应用较为广泛的门禁一卡通系统的功能进行了需求分析,给出了系统的网络结构设计,并详细介绍该系统的各项功能以及可靠性及安全防护措施,对系统特点进行了详细描述. 相似文献
114.
随着电子信息技术、多媒体技术以及网络技术的快速发展,物联网技术也得到了快速的发展.本系统采用的是S3C6410微处理器,结合视频通信模块、传感器模块,对医院病房进行实时监控以及室内温湿度的检测,通过USB无线网卡连接互联网,设计一个无线视频传输系统,将设备采集到的数据通过网络传送到网络服务器,操作系统内移植了嵌入式Web服务器GoA-head,结合PHP、HTML等脚本语言,采用了B/S架构将各项环境参数及指标在网页上显示,实现了运行稳定、速度快、成本低、体积小的无线视频监控平台,具有很大的实用价值. 相似文献
115.
With its simplicity and feasibility, password‐based remote user authentication becomes a popular way to control remote access to network. These years, numerous password‐based authentication schemes have been proposed. Recently, Maitra et al proposed a smart card–based scheme which claims to be resistant to various attacks. Unfortunately, we found some important flaws in this scheme. Therefore, in this paper, we will demonstrate that the scheme of Maitra et al is not secure enough as claimed: neither resisting against off‐line password guessing attack and insider attack nor preserve forward secrecy. To overcome those flaws, we put forward an improved new scheme which not only is resistant to all known attacks but also provides many attractive attributes, such as user revocation and re‐register. Also, we compared the scheme with other related schemes, the result proved the superiority of our scheme. Particularly, we show a new way (beyond the conventional Deffie‐Hellman approach) to achieve forward secrecy. Furthermore, we put some efforts into exploring the design principle of authentication schemes. 相似文献
116.
117.
Cryptanalysis and security enhancement of a robust two‐factor authentication and key agreement protocol
下载免费PDF全文
![点击此处可从《International Journal of Communication Systems》网站下载免费的PDF全文](/ch/ext_images/free.gif)
Qi Xie Na Dong Duncan S. Wong Bin Hu 《International Journal of Communication Systems》2016,29(3):478-487
Two‐factor user authentication scheme allows a user to use a smart card and a password to achieve mutual authentication and establish a session key between a server and a user. In 2012, Chen et al. showed that the scheme of Sood et al. does not achieve mutual authentication and is vulnerable to off‐line password guessing and smart card stolen attacks. They also found that another scheme proposed by Song is vulnerable to similar off‐line password guessing and smart card stolen attacks. They further proposed an improved scheme. In this paper, we first show that the improved scheme of Chen et al. still suffers from off‐line password guessing and smart card stolen attacks, does not support perfect forward secrecy, and lacks the fairness of session key establishment. We then propose a new security‐enhanced scheme and show its security and authentication using the formal verification tool ProVerif, which is based on applied pi calculus. Copyright © 2014 John Wiley & Sons, Ltd. 相似文献
118.
论述了工艺文件管理系统建设的重要性,介绍了工艺文件管理系统设计与开发中的思想、方法、技术和经验。 相似文献
119.
基于PC总线的位置测量与电机控制卡 总被引:23,自引:0,他引:23
由于光栅,步进电机以及IPC工业控制机在机械工业尤其是数控领域中普遍采用,研制出集光栅益检测与步进电机控制两个功能一体的适用于IPC工控机的接口卡具有实用价值。文章介绍了基于PC总线的接口卡的设计,包括硬件结构体系,组成接口卡的几个功能模块以及误差测量控制系统的软件设计,并给出了应用实例。采用该体系结构,在丝杠磨床上实现了传动误差的测量与补偿,大大减小了丝杠传动误差。 相似文献
120.