全文获取类型
收费全文 | 318篇 |
免费 | 93篇 |
专业分类
化学 | 9篇 |
力学 | 1篇 |
综合类 | 12篇 |
数学 | 33篇 |
物理学 | 356篇 |
出版年
2024年 | 2篇 |
2023年 | 4篇 |
2022年 | 35篇 |
2021年 | 28篇 |
2020年 | 17篇 |
2019年 | 5篇 |
2018年 | 3篇 |
2017年 | 32篇 |
2016年 | 14篇 |
2015年 | 16篇 |
2014年 | 37篇 |
2013年 | 27篇 |
2012年 | 22篇 |
2011年 | 29篇 |
2010年 | 20篇 |
2009年 | 22篇 |
2008年 | 25篇 |
2007年 | 16篇 |
2006年 | 12篇 |
2005年 | 13篇 |
2004年 | 8篇 |
2003年 | 8篇 |
2002年 | 1篇 |
2001年 | 3篇 |
2000年 | 1篇 |
1999年 | 1篇 |
1998年 | 6篇 |
1997年 | 3篇 |
1992年 | 1篇 |
排序方式: 共有411条查询结果,搜索用时 437 毫秒
1.
HE Guang-Qiang ZENG Gui-Hua 《理论物理通讯》2006,46(1):61-64
A quantum encryption protocol based on Gaussian-modulated continuous variable EPR correlations is proposed. The security is guaranteed by continuous variable EPR entanglement correlations produced by nondegenerate optical parametric amplifier (NOPA). For general beam splitter eavesdropping strategy, the mutual information I(α, ε) between Alice and Eve is caJculated by employing Shannon information theory. Finally the security analysis is presented. 相似文献
2.
This work proposes and demonstrates the feasibility of gray image encryption using multiple polarization encoding, in which
the cascaded twisted nematic liquid crystal devices sandwiched between a crossed polarizer pair are used to implement exclusive
OR (XOR) logical encryption and decryption. The polarization encoding scheme provides a multichannel XOR logic operation to
secure bit-plane images derived from a gray image, according to the adiabatic following properties of twisted nematic liquid
crystal devices. Experimental data reveal that the multiple polarization encoding schemes for gray image encryption and decryption
are performed with acceptable image quality by selecting appropriate polarization orientation and modulation conditions. Both
analytic and experimental results are presented and discussed. 相似文献
3.
This paper concerns methods by which a trusted authority can distribute keys and/or broadcast a message over a network, so that each member of a privileged subset of users can compute a specified key or decrypt the broadcast message. Moreover, this is done in such a way that no coalition is able to recover any information on a key or broadcast message they are not supposed to know. The problems are studied using the tools of information theory, so the security provided is unconditional (i.e., not based on any computational assumption).In a recent paper st95a, Stinson described a method of constructing key predistribution schemes by combining Mitchell-Piper key distribution patterns with resilient functions; and also presented a construction method for broadcast encryption schemes that combines Fiat-Naor key predistribution schemes with ideal secret sharing schemes. In this paper, we further pursue these two themes, providing several nice applications of these techniques by using combinatorial structures such as orthogonal arrays, perpendicular arrays, Steiner systems and universal hash families. 相似文献
4.
In this paper, we propose a novel image encryption scheme based on DNA (Deoxyribonucleic acid) sequence operations and chaotic system. Firstly, we perform bitwise exclusive OR operation on the pixels of the plain image using the pseudorandom sequences produced by the spatiotemporal chaos system, i.e., CML (coupled map lattice). Secondly, a DNA matrix is obtained by encoding the confused image using a kind of DNA encoding rule. Then we generate the new initial conditions of the CML according to this DNA matrix and the previous initial conditions, which can make the encryption result closely depend on every pixel of the plain image. Thirdly, the rows and columns of the DNA matrix are permuted. Then, the permuted DNA matrix is confused once again. At last, after decoding the confused DNA matrix using a kind of DNA decoding rule, we obtain the ciphered image. Experimental results and theoretical analysis show that the scheme is able to resist various attacks, so it has extraordinarily high security. 相似文献
6.
针对现有多图像加密算法只能同时加密多张同类型同大小的图像,适用范围不广、实用性差等问题,提出一种基于图像重组和比特置乱的多图像加密算法.该算法通过将任意数量、不同大小和不同类型的图像重新组合成新多灰度图,一次完成同时加密,极大提高了加密效率和适用范围.首先,依次提取所有待加密图像像素值重新组合出N张m×n新灰度图,并将其转化成m×n×8N二进制矩阵.然后,采用3D比特置乱方式,对高位页进行行列比特置乱,低位页进行整页比特置乱.最后,进行异或扩散操作,得到密文图像.高低位分开置乱提高了算法的抗噪声能力,最终密文信息熵达到7.999以上,很好地掩盖了明文的统计特性.构造一种新型Logistic与广义三阶Fibonacci级联的混沌系统产生随机序列,增加了初值和控制参数范围,扩大了密钥空间,使其达到8×10^84以上,极大地提高了抗穷举攻击能力.既提高了序列随机性,又同时保留了低维混沌系统的快速性.结合明文哈希值(SHA-256)产生密钥,明文像素值发生微小改变后密文像素值变化率达到0.996以上,极大地提高了的明文敏感性和算法抗选择明文攻击的能力.实验分析表明,提出的多图像加密算法安全性高、实用性强. 相似文献
7.
The Gerchberg–Saxton (G-S) algorithm is a phase retrieval algorithm that is widely used in beam shaping and optical information processing. However, the G-S algorithm has difficulty obtaining the exact solution after iterating, and an approximate solution is often obtained. In this paper, we propose a series of modified G-S algorithms based on the Fresnel transform domain, including the single-phase retrieval (SPR) algorithm, the double-phase retrieval (DPR) algorithm, and the multiple-phase retrieval (MPR) algorithm. The analysis results show that the convergence of the SPR algorithm is better than that of the G-S algorithm, but the exact solution is not obtained. The DPR and MPR algorithms have good convergence and can obtain exact solutions; that is, the information is recovered losslessly. We discuss the security advantages and verification reliability of the proposed algorithms in image encryption. A multiple-image encryption scheme is proposed, in which n plaintexts can be recovered from n ciphertexts, which greatly improves the efficiency of the system. Finally, the proposed algorithms are compared with the current phase retrieval algorithms, and future applications are discussed. We hope that our research can provide new ideas for the application of the G-S algorithm. 相似文献
8.
噪音对光学图象浑沌相位列阵加密和解密的影响 总被引:1,自引:0,他引:1
本文提出了一种用浑沌相位列阵对光学图象加密和解密的方法,并重点分析了加法高斯白噪音对光学图象浑沌相位列阵加密和解密的影响.通过计算机模拟发现加密后的图象与原图象相比,抗振幅噪音的能力增强,而抗相位噪音的能力下降.在一定信噪比范围内,相位噪音是影响解密图象质量的主要因素. 相似文献
9.
We propose a new method for image encryption using fractional Fourier transform and chaos theory. Random phase masks are generated using iterative chaos functions. The input image is combined with the first random phase mask at the object plane and is then transformed using the fractional Fourier transform. After the first fractional Fourier transform, the second random phase mask, again generated by using the chaos functions, is used at the fractional plane. The second fractional Fourier transform operation is then carried out to obtain the encrypted image. Three types of chaos functions have been used: the logistic map, the tent map and the Kaplan–Yorke map. The mean square error and the signal-to-noise ratio between the decrypted image and the input image for the correct order and the incorrect order of the fractional Fourier transform have been calculated. The computer simulations are presented to verify the validity of the proposed technique. 相似文献
10.
In this paper, a new method for color-image encryption using Discrete Quaternion Fourier-Transforms (DQFT) combined with double random-phase encryption is reported, by which color images can be processed as single channel architecture, instead of as separated color components in three channels, so that the complexity of the encryption system can be effectively reduced without any reduction of its security. The principle of both encryption and decryption is detailed and the noise robustness of the system has been examined experimentally. 相似文献