全文获取类型
收费全文 | 3111篇 |
免费 | 528篇 |
国内免费 | 66篇 |
专业分类
化学 | 125篇 |
晶体学 | 4篇 |
力学 | 28篇 |
综合类 | 61篇 |
数学 | 328篇 |
物理学 | 625篇 |
无线电 | 2534篇 |
出版年
2024年 | 9篇 |
2023年 | 42篇 |
2022年 | 102篇 |
2021年 | 146篇 |
2020年 | 154篇 |
2019年 | 95篇 |
2018年 | 82篇 |
2017年 | 109篇 |
2016年 | 130篇 |
2015年 | 133篇 |
2014年 | 239篇 |
2013年 | 186篇 |
2012年 | 238篇 |
2011年 | 237篇 |
2010年 | 201篇 |
2009年 | 213篇 |
2008年 | 201篇 |
2007年 | 201篇 |
2006年 | 204篇 |
2005年 | 153篇 |
2004年 | 114篇 |
2003年 | 99篇 |
2002年 | 99篇 |
2001年 | 53篇 |
2000年 | 69篇 |
1999年 | 40篇 |
1998年 | 40篇 |
1997年 | 40篇 |
1996年 | 21篇 |
1995年 | 12篇 |
1994年 | 9篇 |
1993年 | 7篇 |
1992年 | 4篇 |
1991年 | 4篇 |
1990年 | 3篇 |
1989年 | 4篇 |
1988年 | 1篇 |
1987年 | 1篇 |
1986年 | 2篇 |
1985年 | 2篇 |
1984年 | 2篇 |
1981年 | 1篇 |
1980年 | 2篇 |
1978年 | 1篇 |
排序方式: 共有3705条查询结果,搜索用时 31 毫秒
41.
Hardware security primitives, also known as physical unclonable functions (PUFs), perform innovative roles to extract the randomness unique to specific hardware. This paper proposes a novel hardware security primitive using a commercial off-the-shelf flash memory chip that is an intrinsic part of most commercial Internet of Things (IoT) devices. First, we define a hardware security source model to describe a hardware-based fixed random bit generator for use in security applications, such as cryptographic key generation. Then, we propose a hardware security primitive with flash memory by exploiting the variability of tunneling electrons in the floating gate. In accordance with the requirements for robustness against the environment, timing variations, and random errors, we developed an adaptive extraction algorithm for the flash PUF. Experimental results show that the proposed flash PUF successfully generates a fixed random response, where the uniqueness is 49.1%, steadiness is 3.8%, uniformity is 50.2%, and min-entropy per bit is 0.87. Thus, our approach can be applied to security applications with reliability and satisfy high-entropy requirements, such as cryptographic key generation for IoT devices. 相似文献
42.
Dharminder Dharminder Pradeep Kumar Dadsena Pratik Gupta Sathya Sankaran 《International Journal of Satellite Communications and Networking》2023,41(1):14-28
Satellite's communication system is used to communicate under significant distance and circumstances where the other communication systems are not comfortable. Since all the data are exchanged over a public channel, so the security of the data is an essential component for the communicating parties. Both key exchange and authentication are two cryptographic tools to establish a secure communication between two parties. Currently, various kinds of authentication protocols are available to establish a secure network, but all of them depend on number–theoretical (discrete logarithm problem/factorization assumption) hard assumptions. Due to Shor's and Grover's computing algorithm number theoretic assumptions are breakable by quantum computers. Although Kumar and Garg have proposed a quantum attack-resistant protocol for satellite communication, it cannot resist stolen smart card attack. We have analyzed that how Kumar and Garg is vulnerable to the stolen smart card attack using differential power analysis attack described in He et al and Chen and Chen. We have also analyzed the modified version of signal leakage attack and sometimes called improved signal leakage attack on Kumar and Garg's protocol. We have tried to construct a secure and efficient authentication protocol for satellites communication that is secure against quantum computing. This is more efficient as it requires only three messages of exchange. This paper includes security proof and performance of the proposed authentication and key agreement protocol. 相似文献
43.
周斌 《电信工程技术与标准化》2022,(5)
5G移动通信网络采用新一代蜂窝移动技术,其数据传输速率高于第四代移动通信网络的十倍之多,将第五代移动通信网络应用于城市轨道交通PIS无线系统中,可改善目前基于无线局域网构建的PIS系统中通讯信号易干扰、故障多等弊端。本文从LTE-A技术、MIMO增强技术、MEC技术等5G移动通信关键技术为切入点,从城市轨道交通系统的核心层、接入层、应用层出发,构建全新的智慧轨道交通系统。 相似文献
44.
45.
盲签名的匿名性不仅能保护个人的隐私,也同样给犯罪分子带来了可乘之机.为了解决这一问题,一些方案利用了可信中心给用户颁发的公私钥,然而,用户的不同活动可由用户的公钥及证书联系起来.为了避免这种联系,本文利用况RSA和Fiat-Shamir身份鉴别方案提出了一种简单易行的方案,只需可信中心给用户颁发一次私钥,而由用户在每次使用时根据该私钥来生成不同的公钥,从而保证了多次使用活动的不可联系性.同时在法院授权许可的情况下,可信中心可以揭示用户的身份,以防止用户的犯罪。 相似文献
46.
《Journal of mass spectrometry : JMS》2018,53(5):444-454
The principal purpose of the present work is to characterize the aroma, aroma‐active, and anthocyanin profiles of Okuzgozu wines and to observe the effect of the pomace pressing technique on these parameters. A total of 58 and 59 volatile compounds were identified and quantified in free‐run juice wine (FRW) and pressed pomace wine (PW). Alcohols were found as the most dominant group among aroma compounds followed by esters and acids. However, among all these compounds, only 11 and 13 of them could be considered as key odorants in aromatic extracts of FRW and PW, respectively. According to GC‐MS‐O analysis, ethyl octanoate (fruity), phenyl ethyl acetate (fruity), and 2‐phenyl ethanol (flowery) were found as the main contributors to the overall scent of both wines. Beyond the aroma profiles, anthocyanin contents of both types of wines were also investigated, and total 14 and 15 anthocyanins were identified and quantified in FRW and PW. Malvidin‐3‐glycoside and its acetyl and coumaroyl forms were identified as the dominant anthocyanins in both wines. It is worth noting the pressing application (2.0 atm) led to an increase of some unpleasant notes in the aroma providing chemical, pharmacy, and fermented aromas in wine. On the other hand, the wines produced with pressed pomace presented higher amounts of anthocyanins. 相似文献
47.
EFFECT OF FORESTLAND AVAILABILITY BY OWNERSHIP TYPE ON LICENSE SALES FOR HUNTING: A SPATIAL APPROACH
SEONG‐HOON CHO J.M. BOWKER ROLAND K. ROBERTS SEUNG GYU KIM DAYTON M. LAMBERT NEELAM C. POUDYAL 《Natural Resource Modeling》2012,25(4):549-573
Abstract The effect of forestland availability under different ownership types on license sales for hunting in nine Southeastern states is empirically evaluated. An equation that represents license sales for hunting is estimated assuming the sale of hunting licenses in a particular county is related to the characteristics of that county as well as the characteristics and license sales for hunting in its neighboring counties. The positive effects of the amounts of both national and private forestland on license sales reaffirm the potential benefits of maintaining forestland to stimulate hunting. The positive spillover effect of national forests on license sales for hunting suggests that availability and close access to hunting in national forests within neighboring counties are important in supporting hunting license sales in a county. This study contributes to the general understanding of the drivers affecting individuals’ decisions to use natural resources for hunting. Advances in natural resource modeling, specifically the spatial process model and geospatial data used in this research, make it possible to examine the interactions between the spatial dynamics and ownership attributes of the natural system, allowing policy makers to design natural resource management practices that respond to a system characterized by these interactions. 相似文献
48.
Advanced metering infrastructure (AMI) provides 2‐way communications between the utility and the smart meters. Developing authenticated key exchange (AKE) and broadcast authentication (BA) protocols is essential to provide secure communications in AMI. The security of all existing cryptographic protocols is based on the assumption that secret information is stored in the nonvolatile memories. In the AMI, the attackers can obtain some or all of the stored secret information from memories by a great variety of inexpensive and fast side‐channel attacks. Thus, all existing AKE and BA protocols are no longer secure. In this paper, we investigate how to develop secure AKE and BA protocols in the presence of memory attacks. As a solution, we propose to embed a physical unclonable function (PUF) in each party, which generates the secret values as required without the need to store them. By combining PUFs and 2 well‐known and secure protocols, we propose PUF‐based AKE and BA protocols. We show that our proposed protocols are memory leakage resilient. In addition, we prove their security in the standard model. Performance analysis of both protocols shows their efficiency for AMI applications. The proposed protocols can be easily implemented. 相似文献
49.
50.
从一般线性群GL(n,F)和对称群Sn上的困难问题出发,构造了几个密钥交换算法,新算法具有更高的效率.同时,指出基于一般线性群的密钥交换算法的安全性直接依赖于广义矩阵覆盖问题,基于对称群的密钥交换协议的安全性直接依赖于置换群上的共轭问题. 相似文献