首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   164篇
  免费   20篇
  国内免费   7篇
化学   47篇
综合类   20篇
数学   61篇
物理学   63篇
  2024年   1篇
  2023年   5篇
  2022年   12篇
  2021年   6篇
  2020年   5篇
  2019年   5篇
  2018年   4篇
  2017年   8篇
  2016年   4篇
  2015年   1篇
  2014年   10篇
  2013年   10篇
  2012年   10篇
  2011年   9篇
  2010年   8篇
  2009年   14篇
  2008年   10篇
  2007年   12篇
  2006年   9篇
  2005年   10篇
  2004年   6篇
  2003年   2篇
  2002年   1篇
  2001年   5篇
  2000年   5篇
  1999年   3篇
  1998年   10篇
  1997年   3篇
  1996年   1篇
  1995年   2篇
排序方式: 共有191条查询结果,搜索用时 15 毫秒
1.
本文研究带仲裁认证码(亦称A^2-码)。一个A^2-码,当它的欺骗攻击成功概率达到信息论下界且密钥长度也达到最小时称为是最优的。本文给出最优A^2-码的组合结构的特征,从而将构造最优A^2-码的问题归结为构造相应的一类组合设计的问题。  相似文献   
2.
Currently, the authentication analysis of edible fats and oils is an emerging issue not only by producers but also by food industries, regulators, and consumers. The adulteration of high quality and expensive edible fats and oils as well as food products containing fats and oils with lower ones are typically motivated by economic reasons. Some analytical methods have been used for authentication analysis of food products, but some of them are complex in sampling preparation and involving sophisticated instruments. Therefore, simple and reliable methods are proposed and developed for these authentication purposes. This review highlighted the comprehensive reports on the application of infrared spectroscopy combined with chemometrics for authentication of fats and oils. New findings of this review included (1) FTIR spectroscopy combined with chemometrics, which has been used to authenticate fats and oils; (2) due to as fingerprint analytical tools, FTIR spectra have emerged as the most reported analytical techniques applied for authentication analysis of fats and oils; (3) the use of chemometrics as analytical data treatment is a must to extract the information from FTIR spectra to be understandable data. Next, the combination of FTIR spectroscopy with chemometrics must be proposed, developed, and standardized for authentication and assuring the quality of fats and oils.  相似文献   
3.
Direct infusion electrospray ionization mass spectrometry in the positive ion mode [ESI(+)‐MS] is used to obtain fingerprints of aqueous–methanolic extracts of two types of olive oils, extra virgin (EV) and ordinary (OR), as well as of samples of EV olive oil adulterated by the addition of OR olive oil and other edible oils: corn (CO), sunflower (SF), soybean (SO) and canola (CA). The MS data is treated by the partial least squares discriminant analysis (PLS‐DA) protocol aiming at discriminating the above‐mentioned classes formed by the genuine olive oils, EV (1) and OR (2), as well as the EV adulterated samples, i.e. EV/SO (3), EV/CO (4), EV/SF (5), EV/CA (6) and EV/OR (7). The PLS‐DA model employed is built with 190 and 70 samples for the training and test sets, respectively. For all classes (1–7), EV and OR olive oils as well as the adulterated samples (in a proportion varying from 0.5 to 20.0% w/w) are properly classified. The developed methodology required no ions identification and demonstrated to be fast, as each measurement lasted about 3 min including the extraction step and MS analysis, and reliable, because high sensitivities (rate of true positives) and specificities (rate of true negatives) were achieved. Finally, it can be envisaged that this approach has potential to be applied in quality control of EV olive oils. Copyright © 2013 John Wiley & Sons, Ltd.  相似文献   
4.
A new modified remote user authentication scheme using smart cards   总被引:1,自引:0,他引:1  
In 2000, a remote user authentication scheme using smart cards was proposed and the masquerade attacks were proved successful on this scheme. Recently, Kumar has suggested the idea of check digits to overcome the above attacks with a new scheme that removes these threats well. In this paper it is pointed out that the weakness still exists in Kumar's scheme, and the intruder can login to the remote system through having some information. A new scheme which can overcome these attacks and appears more secure and efficient than Kumar's is presented.  相似文献   
5.
A novel efficient deterministic secure quantum communication scheme based on four-qubit cluster states and single-photon identity authentication is proposed. In this scheme, the two authenticated users can transmit two bits of classical information per cluster state, and its efficiency of the quantum communication is 1/3, which is approximately 1.67 times that of the previous protocol presented by Wang et al [Chin. Phys. Lett. 23 (2006) 2658]. Security analysis shows the present scheme is secure against intercept-resend attack and the impersonator's attack. Furthermore, it is more economic with present-day techniques and easily processed by a one-way quantum computer.  相似文献   
6.
Holographic watermarking for authentication of cut images   总被引:3,自引:0,他引:3  
A watermarking technique, with a Computer Generated Hologram (CGH) coding system of the mark, is introduced and tested. The CGH watermarking can be used to authenticate parts of the original image. The hologram of the mark is embedded in the spatial domain by a blind additive embedding technique. The use of holography allows authenticating cuts of the original image, is the major novelty of this paper. The proposed methodology is characterized as an authentication technique, since it does not rely on the original image to decide whether the watermarked image has been altered or not and at the same time it is able to detect and localize any possible malicious change. Asymmetric cryptography is used to hide the hash information in an unambiguous way (non-repudiation property).  相似文献   
7.
This paper is devoted to constructing an authentication code with arbitration using subspaces of vector spaces over finite fields.Moreover,if we choose the encoding rules of the transmitter and the decoding rules of the receiver according to a uniform probability distribution,then some parameters and the probabilities of successful attacks are computed.  相似文献   
8.
2000年,Hwang和Li提出了一个新的智能卡远程用户认证方案,随后Chan和Cheng对该方案进行了成功的攻击.最近Shen,Lin和Hwang针对该方案提出了一种不同的攻击方法,并提供了一个改进方案用于抵御这些攻击.2003年,Leung等认为Shen-Lin-Hwang改进方案仍然不能抵御Chan和Cheng的攻击,他们用改进后的Chang-Hwang攻击方法进行了攻击.文中主要在Hwang-Li方案的基础上,提出了一个新的远程用户认证方案,该方案主要在注册阶段和登录阶段加强了安全性,抵御了类似Chan-Cheng和Chang-Hwang的攻击.  相似文献   
9.
Cheating in Visual Cryptography   总被引:3,自引:0,他引:3  
A secret sharing scheme allows a secret to be shared among a set of participants, P, such that only authorized subsets of P can recover the secret, but any unauthorized subset cannot recover the secret. In 1995, Naor and Shamir proposed a variant of secret sharing, called visual cryptography, where the shares given to participants are xeroxed onto transparencies. If X is an authorized subset of P, then the participants in X can visually recover the secret image by stacking their transparencies together without performing any computation. In this paper, we address the issue of cheating by dishonest participants, called cheaters, in visual cryptography. The experimental results demonstrate that cheating is possible when the cheaters form a coalition in order to deceive honest participants. We also propose two simple cheating prevention visual cryptographic schemes.  相似文献   
10.
This work presents an overview of the applicability of PCR-based capillary electrophoresis (CE) in food authentication and traceability of foods from animal origin. Analytical approaches for authenticating and tracing meat and meat products and fish and seafood products are discussed. Particular emphasis will be given to the usefulness of genotyping in food tracing by using CE-based genetic analyzers.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号