全文获取类型
收费全文 | 296篇 |
免费 | 49篇 |
国内免费 | 4篇 |
专业分类
化学 | 51篇 |
力学 | 1篇 |
综合类 | 25篇 |
数学 | 55篇 |
物理学 | 8篇 |
无线电 | 209篇 |
出版年
2024年 | 1篇 |
2023年 | 2篇 |
2022年 | 10篇 |
2021年 | 17篇 |
2020年 | 17篇 |
2019年 | 14篇 |
2018年 | 7篇 |
2017年 | 12篇 |
2016年 | 12篇 |
2015年 | 9篇 |
2014年 | 22篇 |
2013年 | 22篇 |
2012年 | 31篇 |
2011年 | 27篇 |
2010年 | 36篇 |
2009年 | 19篇 |
2008年 | 13篇 |
2007年 | 17篇 |
2006年 | 24篇 |
2005年 | 8篇 |
2004年 | 5篇 |
2003年 | 3篇 |
2002年 | 7篇 |
2000年 | 4篇 |
1999年 | 2篇 |
1998年 | 2篇 |
1996年 | 3篇 |
1995年 | 1篇 |
1993年 | 1篇 |
1984年 | 1篇 |
排序方式: 共有349条查询结果,搜索用时 31 毫秒
21.
范文跃 《信息安全与通信保密》2006,(8):66-68
在分析移动智能平台安全需求基础上,从逻辑原理、硬件组成、软件系统三个层面提出了移动智能平台的可信计算体系结构,之后提出了包含十种可信计算应用功能的全景图。 相似文献
22.
Since the guarantee of trustiness is considered inadequate in traditional software development methods, software developed using these methods lacks effective measures for ensuring its trustiness. Combining agent technique with the support of trusted computing provided by TPM, a trust shell based constitution model of trusted software (TSCMTS) is demonstrated, trust shell ensures the trustiness of software logically. The concept of Trust Engine is proposed, which extends the “chain of trust” of TCG into application, and cooperates with TPM to perform integrity measurement for software entity to ensure the static trustiness; Data Structure called trust view is defined to represent the characteristic of software behavior. For the purpose of improving the accuracy of trustiness constraints, a strategy for determining the weights of characteristic attributes based on information entropy is proposed. Simulation experiments illustrate that the trustiness of software developed by the TSCMTS is improved effectively without performance degradation. 相似文献
23.
LORENZ Edward 《中国电子科技》2006,4(4):373-384
Drawing on the results of the third Community Innovation Survey and the third European Working Conditions Survey, this paper develops aggregate indicators at the national level of innovation modes and forms of work organization for the 15 member nations of the European Union in 2000. The analysis based on these indicators demonstrates that there is a close connection between how people work and learn in a country and the way firms' innovate. Specifically, it shows that in nations where work is organized to support high levels of discretion in solving complex problems firms tend to be more active in terms of endogenous innovation, i.e. innovation developed, at least to some degree, in house. In countries where learning and problem-solving on the job are more constrained, and little discretion is left to the employee, firms tend to engage in a supplier-dominated innovation strategy. The technological renewal of these firms reflects, almost exclusively, absorption of innovations developed elsewhere. 相似文献
24.
25.
In the greenhouse environment,the concentration of nutrient solution was always ignored.At the same time,the core node coordinator of the ZigBee wireless monitoring system was easily compromised.A trusted solution monitoring system based on ZigBee wireless sensor network was designed and implemented.Firstly the hardware structure of sensor,router and coordinator was introduced.Then the processes of external voltage measurement and data cleaning were illustrated.For realizing the trusted boot of the coordinator,trusted u-boot to measure the integrity of some key files was designed.Experimental results show that the solution concentration data could be sent from each node to the monitoring computer and the remote terminal.At the same time,the trusted module of the coordinator can detect the captured coordinator node and warning.Therefore,the designed system has strong function and security. 相似文献
26.
27.
针对当前移动终端支付系统的安全性问题,分析了可信计算技术的基本思想,利用双线性对及离散对数问题的数学知识,提出了一种在可信移动平台上结合SIM卡的数字签名方案,增加了移动终端系统的安全性。为了防止消息在公共信道被篡改,利用用户与签名者的一次一密密码加密系统对消息和签名进行加密处理。最后,给出该方案的正确性证明和安全性分析,证明该方案在理论上可行且具有很高的安全性。 相似文献
28.
29.
30.
人工免疫系统方法中的否定选择(NS)算法已广泛应用于病毒防护、入侵检测、垃圾邮件检测等.然而,由于当前的计算机中不存在类似"免疫器官"的硬件部件,无法对NS算法的运行提供保护,可能造成其运行过程遭受恶意干扰,成熟检测器和中间变量遭受篡改,进而导致其检测结果不可信.借鉴自然免疫系统的组成和原理,提出一种基于可信根的计算机终端免疫模型(TRBCTIM),引入可信计算技术中的可信根作为"免疫器官",对NS算法实施保护.采用无干扰可信模型理论对新模型进行分析,并通过构建新模型的原型系统来进行性能实验.理论分析及实验结果表明,新模型能够确保NS算法的运行过程和检测结果可信. 相似文献