首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   2078篇
  免费   294篇
  国内免费   17篇
化学   65篇
晶体学   3篇
力学   29篇
综合类   55篇
数学   103篇
物理学   412篇
无线电   1722篇
  2025年   9篇
  2024年   19篇
  2023年   34篇
  2022年   66篇
  2021年   92篇
  2020年   97篇
  2019年   70篇
  2018年   58篇
  2017年   73篇
  2016年   85篇
  2015年   96篇
  2014年   147篇
  2013年   112篇
  2012年   145篇
  2011年   142篇
  2010年   126篇
  2009年   138篇
  2008年   139篇
  2007年   124篇
  2006年   121篇
  2005年   100篇
  2004年   70篇
  2003年   67篇
  2002年   61篇
  2001年   35篇
  2000年   40篇
  1999年   30篇
  1998年   28篇
  1997年   25篇
  1996年   12篇
  1995年   6篇
  1994年   4篇
  1993年   4篇
  1992年   3篇
  1991年   3篇
  1990年   2篇
  1989年   4篇
  1986年   1篇
  1980年   1篇
排序方式: 共有2389条查询结果,搜索用时 15 毫秒
61.
    
There exists a natural trade-off in public key encryption (PKE) schemes based on ring learning with errors (RLWE), namely: we would like a wider error distribution to increase the security, but it comes at the cost of an increased decryption failure rate (DFR). A straightforward solution to this problem is the error-correcting code, which is commonly used in communication systems and already appears in some RLWE-based proposals. However, applying error-correcting codes to those cryptographic schemes is far from simply installing an add-on. Firstly, the residue error term derived by decryption has correlated coefficients, whereas most prevalent error-correcting codes with remarkable error tolerance assume the channel noise to be independent and memoryless. This explains why only simple error-correcting methods are used in existing RLWE-based PKE schemes. Secondly, the residue error term has correlated coefficients leaving accurate DFR estimation challenging even for uncoded plaintext. It can be found in the literature that a tighter DFR estimation can effectively create a DFR margin. Thirdly, most error-correcting codes are not well designed for safety considerations, e.g., syndrome decoding has a nonconstant time nature. A code good at error correcting might be weak under a variety of attacks. In this work, we propose a polar coding scheme for RLWE-based PKE. A relaxed “independence” assumption is used to derive an uncorrelated residue noise term, and a wireless communication strategy, outage, is used to construct polar codes. Furthermore, some knowledge about the residue noise is exploited to improve the decoding performance. With the parameterization of NewHope Round 2, the proposed scheme creates a considerable DRF margin, which gives a competitive security improvement compared to state-of-the-art benchmarks. Specifically, the security is improved by 28.8%, while a DFR of 2149 is achieved a for code rate pf 0.25, n=1024,q= 12,289, and binomial parameter k=55. Moreover, polar encoding and decoding have a quasilinear complexity O(Nlog2N) and intrinsically support constant-time implementations.  相似文献   
62.
    
We perform security analysis of a passive continuous-variable quantum key distribution (CV-QKD) protocol by considering the finite-size effect. In the passive CV-QKD scheme, Alice utilizes thermal sources to passively make preparation of quantum state without Gaussian modulations. With this technique, the quantum states can be prepared precisely to match the high transmission rate. Here, both asymptotic regime and finite-size regime are considered to make a comparison. In the finite-size scenario, we illustrate the passive CV-QKD protocol against collective attacks. Simulation results show that the performance of passive CV-QKD protocol in the finite-size case is more pessimistic than that achieved in the asymptotic case, which indicates that the finite-size effect has a great influence on the performance of the single-mode passive CV-QKD protocol. However, we can still obtain a reasonable performance in the finite-size regime by enhancing the average photon number of the thermal state.  相似文献   
63.
    
Rosa roxburghii tratt (RRT), widely distributed in the southwest of China, is favored by consumers for its good taste and healthy functions. In this study, thirty-seven compounds of Rosa roxburghii Tratt (RRT) were identified and quantified by gas chromatography–olfactometry (G–O) and gas chromatography–mass spectrometry (GC–MS) analysis. Furthermore, ethyl 2-methylpropanoate, ethyl butanoate, ethyl 2-methylbutyrate, and ethyl hexanoate were present with much higher odor activity values (OAVs) than other compounds. The key notes were confirmed by omission tests. Possible interaction among key notes was investigated through odor intensity determination and sensory analysis. It showed fruity and woody notes had synergistic effects. Full factorial design was used to evaluate the notes contribution to the whole odor. One important finding is the major effect of order interactions, fruity note (X1) and woody note (X4) especially, emphasizing the existence of complex interactions occurring between odor notes. The interaction X1X4 was further investigated. The woody note has a positive effect when the fruity note is also in the mixture but tends to show a negative effect otherwise.  相似文献   
64.
    
To characterize key odorants in scallion pancake (SP), volatiles were extracted by solvent extraction-solvent assisted flavor evaporation. A total of 51 odor-active compounds were identified by gas chromatography-olfactometry (GC-O) and chromatography–mass spectrometry (GC-MS). (Z/E)-3,6-Diethyl-1,2,4,5-tetrathiane was detected for the first time in scallion food. Application of aroma extract dilution analysis to extracts showed maltol, methyl propyl disulfide, dipropyl disulfide and 2-pentylfuran had the highest flavor dilution (FD) factor of 4096. Twenty-three odorants with FD factors ≥ 8 were quantitated, and their odor active values (OAVs) were calculated. Ten compounds with OAVs ≥ 1 were determined as the key odorants; a recombinate model prepared from the key odorants, including (E,E)-2,4-decadienal, dimethyl trisulfide, methyl propyl disulfide, hexanal, dipropyl trisulfide, maltol, acetoin, 2-methylnaphthalene, 2-pentylfuran and 2(5H)-furanone, successfully simulated the overall aroma profile of SP. The changes in odorants during storage were investigated further. With increasing concentrations and OAVs during storage, hexanal became an off-flavor compound.  相似文献   
65.
    
In quantum key distribution (QKD), there are some security loopholes opened by the gaps between the theoretical model and the practical system, and they may be exploited by eavesdroppers (Eve) to obtain secret key information without being detected. This is an effective quantum hacking strategy that seriously threatens the security of practical QKD systems. In this paper, we propose a new quantum hacking attack on an integrated silicon photonic continuous-variable quantum key distribution (CVQKD) system, which is known as a power analysis attack. This attack can be implemented by analyzing the power originating from the integrated electrical control circuit in state preparation with the help of machine learning, where the state preparation is assumed to be perfect in initial security proofs. Specifically, we describe a possible power model and show a complete attack based on a support vector regression (SVR) algorithm. The simulation results show that the secret key information decreases with the increase of the accuracy of the attack, especially in a situation with less excess noise. In particular, Eve does not have to intrude into the transmitter chip (Alice), and may perform a similar attack in practical chip-based discrete-variable quantum key distribution (DVQKD) systems. To resist this attack, the electrical control circuit should be improved to randomize the corresponding power. In addition, the power can be reduced by utilizing the dynamic voltage and frequency scaling (DVFS) technology.  相似文献   
66.
The number of transmitted signals in practical quantum key distribution (QKD) protocol is always finite. We discuss the security of decoy states QKD protocol with finite resources by considering the statistical fluctuation for the yield and error rate of the quantum state in different sources of pulses (signal sources and decoy sources). The number of exchanged quantum signals vs positive key generation rate is given with experiment results.  相似文献   
67.
链路持续时间是影响卫星量子密钥分发量子比特率的重要参数.文章分析了影响星-地单光子和纠缠光子量子密钥分发链路持续时间的若干因素,并且进行了数值仿真研究.结果表明,随着轨道高度的增加或者地面最小通信仰角的减小,单光子和纠缠光子链路的持续时间有较大的改善;单光子链路时地面站同卫星星下点轨迹间的距离和纠缠光子链路时两地面站之间的距离也均是影响链路持续时间的重要参数;纠缠光子链路持续时间的影响因素较单光子链路更为复杂,其最终决定于卫星星下点轨迹同两地面站之间的位置关系.  相似文献   
68.
Ground-satellite quantum key distribution(QKD)is a feasible way to implement global-scale quantum communication.Herein we propose an approach to dynamically compensate the polarization of the photons when passing through the optical telescope used in ground-satellite QKD.Our results experimentally demonstrate that the fidelity of any polarization state after dynamic compensation can be achieved by more than 99.5%,which fulfills the requirements of ground-satellite QKD.  相似文献   
69.
密钥协商是量子密钥分配(QKD)的重要环节,影响着QKD的密钥率和安全距离.作为一种低信噪比时较为高效的密钥协商方案,多维协商算法被很好地应用在高斯调制连续变量QKD中,延长了通信距离.本文研究了二进制LDPC码在多维协商算法中的应用方案,进而扩展到多进制LDPC码.仿真表明,相比二进制LDPC码,利用多进制LDPC码能够使多维协商性能获得明显增益.  相似文献   
70.
关志涛  徐月  伍军 《通信学报》2013,34(12):71-78
提出一种新的密钥管理方案KMTP(key management based on ternary polynomial)。基站为每个节点建立唯一性标识,保证节点合法性;基于三元多项式设计簇内和簇间密钥预分配算法,可以保证秘密多项式的破解门限值分别大于簇内节点和分簇总数,理论上难以破解;通过构造安全连通邻接表,设计簇间多跳路由选择算法,保证通信阶段的安全;引入更新参数和更新认证数,保证密钥更新阶段的安全。仿真表明,相比已有方案,KMTP开销较小,且能够提供更高的安全性。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号