全文获取类型
收费全文 | 5825篇 |
免费 | 729篇 |
国内免费 | 57篇 |
专业分类
化学 | 44篇 |
晶体学 | 2篇 |
力学 | 36篇 |
综合类 | 90篇 |
数学 | 304篇 |
物理学 | 583篇 |
无线电 | 5552篇 |
出版年
2024年 | 14篇 |
2023年 | 81篇 |
2022年 | 134篇 |
2021年 | 225篇 |
2020年 | 238篇 |
2019年 | 145篇 |
2018年 | 120篇 |
2017年 | 218篇 |
2016年 | 232篇 |
2015年 | 262篇 |
2014年 | 476篇 |
2013年 | 345篇 |
2012年 | 474篇 |
2011年 | 427篇 |
2010年 | 317篇 |
2009年 | 336篇 |
2008年 | 397篇 |
2007年 | 365篇 |
2006年 | 346篇 |
2005年 | 283篇 |
2004年 | 251篇 |
2003年 | 244篇 |
2002年 | 177篇 |
2001年 | 110篇 |
2000年 | 104篇 |
1999年 | 62篇 |
1998年 | 61篇 |
1997年 | 45篇 |
1996年 | 40篇 |
1995年 | 25篇 |
1994年 | 15篇 |
1993年 | 10篇 |
1992年 | 9篇 |
1991年 | 7篇 |
1990年 | 7篇 |
1989年 | 3篇 |
1988年 | 1篇 |
1985年 | 1篇 |
1984年 | 2篇 |
1983年 | 1篇 |
1979年 | 1篇 |
排序方式: 共有6611条查询结果,搜索用时 15 毫秒
981.
982.
983.
Muhammad Yaseen Kashif Saleem Mehmet A. Orgun Abdelouahid Derhab Haider Abbas Jalal Al-Muhtadi Waseem Iqbal Imran Rashid 《Telematics and Informatics》2018,35(4):702-726
Recent advances in hardware technology have led to the development of low cost, power efficient and more feature rich devices that are amongst the most critical parts of communication networks. These devices or sensors can now sense data with more accuracy, process it by themselves and send it to the neighboring node or the sink node. However, robust and reliable security mechanisms are not yet properly implemented on these sensors due to their limited energy and computation power. Sensors also play a very important role in eHealthcare systems where ubiquitous patient monitoring is performed. As data is generated from the sensor nodes, reliable, secure and attack-resistant data acquisition and transmission is important for an efficient eHealthcare systems. This survey focuses on security issues of sensors data acquisition and transmission protocols, describing their main security features and comparing them in the context of a secure eHealthcare system. A taxonomy of open issues and future challenges is also discussed with respect to specific security metrics described in the paper. 相似文献
984.
In order to carry on copyright protection and security verification of color QR code,the digital image chaos encryption technology and digital watermarking technology were respectively researched.Firstly,an improved image chaos encryption algorithm was proposed as a preprocessing step of digital watermarking algorithm.Then a color QR code digital watermarking algorithm was designed based on discrete wavelet transform and matrix singular value decomposition.Finally,the feasibility of the algorithm was verified by experiments.The results show that the proposed method has good resistance to JPEG compression,noise attack and cropping attack. 相似文献
985.
In order to solve the problem of poor efficiency and low accuracy of Android collusion detection,an Android collusion attack model based on component communication was proposed.Firstly,the feature vector set was extracted from the known applications and the feature vector set was generated.Secondly,the security policy rule set was generated through training and classifying the privilege feature set.Then,the component communication finite state machine according to the component and communication mode feature vector set was generated,and security policy rule set was optimized.Finally,a new state machine was generated by extracting the unknown application’s feature vector set,and the optimized security policy rule set was matched to detect privilege collusion attacks.The experimental results show that the proposed model has better detective efficiency and higher accuracy. 相似文献
986.
The achievable key rate of secret key generation method in multi-hop relaying systems was relative low in Internet of things.A cooperative secret key generation algorithm based on network coding was proposed to improve the achievable key rate.Firstly,all the nodes send training sequences in turn to estimate the channels.After that the relays employ secure network coding technique to assist the two legitimate users to obtain the correlative observations of the same wireless channel,with nothing leakage about the channel information to the eavesdropper.Finally,the two legitimate users agreed on a common secret key directly over the public channel.Theoretical and simulation results validate the performance of the proposed secret key generation algorithm,and obtain that increasing the wireless transmission paths,selecting the transmission path with less hops and larger variance channels can further improve the achievable secret key rate. 相似文献
987.
从物理层安全的角度出发,在含有协作中继的通信网络中,通过选择最优中继来传递信息可有效提升系统性能。讨论了在含有多个单天线窃听用户的多中继通信系统中对最优中继的选择方案,并对系统采用放大转发(amplify-and-forward,AF)协议和解码转发(decode-and-forward,DF)协议这两种不同的情况分别进行了讨论和比较,同时还对比了不含中继的直接传输情况。理论分析和仿真结果表明,最优中继选择方案可有效保障系统的安全性能。 相似文献
988.
Aiming at the requirements of privacy metric and classification for the difficulty of private data identification in current network environment, a privacy data metric and classification model based on Shannon information entropy and BP neural network was proposed. The model establishes two layers of privacy metrics from three dimensions. Based on the dataset itself, Shannon information entropy was used to weight the secondary privacy elements, and the privacy of each record in the dataset under the first-level privacy metrics was calculated. The trained BP neural network was used to output the classification result of privacy data without pre-determining the metric weight. Experiments show that the model can measure and classify private data with low false rate and small misjudged deviation. 相似文献
989.
990.
本文提出一种基于公钥密码体制(Number Theory Research Unit,NTRU)选择明文攻击(Chosen Plaintext Attack,CPA)可证明安全的全同态加密方案.首先,对NTRU的密钥生成算法进行改进,通过格上的高斯抽象算法生成密钥对,避免了有效的格攻击,同时,没有改变密钥的分布.然后,基于改进的NTRU加密算法,利用Flattening技术,构造了一个全同态加密体制,并在标准模型下证明方案是选择明文攻击不可区分性IND-CPA安全的. 相似文献