全文获取类型
收费全文 | 1335篇 |
免费 | 217篇 |
国内免费 | 20篇 |
专业分类
化学 | 120篇 |
晶体学 | 2篇 |
力学 | 62篇 |
综合类 | 17篇 |
数学 | 45篇 |
物理学 | 133篇 |
无线电 | 1193篇 |
出版年
2024年 | 4篇 |
2023年 | 29篇 |
2022年 | 45篇 |
2021年 | 55篇 |
2020年 | 64篇 |
2019年 | 44篇 |
2018年 | 45篇 |
2017年 | 61篇 |
2016年 | 65篇 |
2015年 | 85篇 |
2014年 | 131篇 |
2013年 | 97篇 |
2012年 | 100篇 |
2011年 | 107篇 |
2010年 | 85篇 |
2009年 | 70篇 |
2008年 | 102篇 |
2007年 | 79篇 |
2006年 | 64篇 |
2005年 | 53篇 |
2004年 | 49篇 |
2003年 | 34篇 |
2002年 | 22篇 |
2001年 | 12篇 |
2000年 | 22篇 |
1999年 | 12篇 |
1998年 | 3篇 |
1997年 | 6篇 |
1996年 | 7篇 |
1995年 | 4篇 |
1994年 | 2篇 |
1993年 | 3篇 |
1992年 | 4篇 |
1991年 | 3篇 |
1990年 | 1篇 |
1984年 | 1篇 |
1979年 | 1篇 |
1977年 | 1篇 |
排序方式: 共有1572条查询结果,搜索用时 15 毫秒
61.
To protect against algebraic attacks, a high algebraic immunity is now an important criterion for Boolean functions used in stream ciphers. In this paper, a new method based on a univariate polynomial representation of Boolean functions is proposed. The proposed method is used to construct Boolean functions with an odd number of variables and with maximum algebraic immunity. We also discuss the nonlinearity of the constructed functions. Moreover, a lower bound is determined for the number of Boolean functions with maximum algebraic immunity. 相似文献
62.
Cooperative detection and protection for Interest flooding attacks in named data networking
下载免费PDF全文
![点击此处可从《International Journal of Communication Systems》网站下载免费的PDF全文](/ch/ext_images/free.gif)
Kun Ding Yun Liu Hsin‐Hung Cho Han‐Chieh Chao Timothy K. Shih 《International Journal of Communication Systems》2016,29(13):1968-1980
Named data networking (NDN) is a new emerging architecture for future network, which may be a substitute of the current TCP/IP‐based network, for the content‐oriented data request mode becoming the future trend of development. The security of NDN has attracted much attention, as an implementation of next‐generation Internet architecture. Although NDN is immune to most current attack, it cannot resist the distributed denial of service like attack – Interest flooding attack (IFA) – effectively. IFA takes advantages of the forwarding mechanism of NDN, flooding a large number of malicious Interest packets at quite a high rate, and exploits the network resources, which may cause the paralysis of the network. Taking into account the severity of the destruction, we propose an algorithm to counter such new type of attack. We analyze three properties of IFA, and use them to judge and filter Interest packets. Vector space model and Markov model are used in our method to realize a cooperative detection. Meanwhile, we present the retransmission forwarding mechanism to ensure legitimate user request. The ndnSIM module of ns3 is used for the corresponding simulation, and results of the simulation will be given to show the effectiveness of our algorithm. Copyright © 2014 John Wiley & Sons, Ltd. 相似文献
63.
64.
提议以网络中心战为背景构建网络对抗作战体系和效能评估体系。建议以"比特战"为切入点,引导现有通信对抗技术融合进入网络对抗技术体系,并以软件无线电和认知无线电为基础,发展网络对抗通用平台和系统,并兼顾专用平台和系统。由于"网络空间"的出现,战场网络对抗必然需要深入到网络内部,建议针对网络的开放性、复杂性和标准性,开展渗透攻击研究。 相似文献
65.
66.
Steganalysis attack is to statistically estimate the embedded watermark in the watermarked multimedia,and the estimated watermark may be destroyed by the attacker.The existing methods of false negative probability,however,do not consider the influence of steganalysis attack.This paper proposed the game theory based false negative probability to estimate the impacts of steganalysis attack,as well as unintentional attack.Specifically,game theory was used to model the collision between the embedment and steganalysis attack,and derive the optimal building embedding/attacking strategy.Such optimal playing strategies devote to calculating the attacker destructed watermark,used for calculation of the game theory based false negative probability.The experimental results show that watermark detection reliability measured using our proposed method,in comparison,can better reflect the real scenario in which the embedded watermark undergoes unintentional attack and the attacker using steganalysis attack.This paper provides a foundation for investigating countermeasures of digital watermarking community against steganalysis attack. 相似文献
67.
68.
69.
一种代理多重数字签名方案的安全性分析 总被引:17,自引:2,他引:17
对Qi和Harn的代理多重数字签名方案,提出了一种伪造攻击,利用该伪造攻击,n个原始签名者中任何一个签名者都能伪造出一个有效代理多重数字签名,并对Qi和Harn的代理多重数字签名方案进行了改进,提出了一种新的安全的代理多重数字签名方案。 相似文献
70.
讨论针对随机伪操作椭圆曲线密码标量乘算法的SPA攻击,理论推导和实测结果均表明,在单样本SPA攻击下,即可在功耗曲线中获取大量的密钥信息;而在针对算法中随机操作漏洞的一种新型多样本SPA攻击—多样本递推逼近攻击下,用极小样本量就可完整破译密钥.当密钥长度为n时,该攻击方法完整破译密钥所需的样本数仅为0(1b n). 相似文献