首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1786篇
  免费   285篇
  国内免费   20篇
化学   12篇
晶体学   1篇
力学   1篇
综合类   12篇
数学   33篇
物理学   533篇
无线电   1499篇
  2024年   10篇
  2023年   41篇
  2022年   66篇
  2021年   85篇
  2020年   79篇
  2019年   40篇
  2018年   48篇
  2017年   88篇
  2016年   68篇
  2015年   79篇
  2014年   180篇
  2013年   115篇
  2012年   128篇
  2011年   121篇
  2010年   89篇
  2009年   104篇
  2008年   108篇
  2007年   120篇
  2006年   100篇
  2005年   105篇
  2004年   67篇
  2003年   67篇
  2002年   33篇
  2001年   37篇
  2000年   27篇
  1999年   25篇
  1998年   18篇
  1997年   13篇
  1996年   14篇
  1995年   7篇
  1994年   2篇
  1993年   3篇
  1992年   3篇
  1988年   1篇
排序方式: 共有2091条查询结果,搜索用时 0 毫秒
1.
Algebraic properties of cryptosystem PGM   总被引:2,自引:0,他引:2  
In the late 1970s Magliveras invented a private-key cryptographic system calledPermutation Group Mappings (PGM). PGM is based on the prolific existence of certain kinds of factorization sets, calledlogarithmic signatures, for finite permutation groups. PGM is an endomorphic system with message space ℤ|G| for a given finite permutation groupG. In this paper we prove several algebraic properties of PGM. We show that the set of PGM transformations ℐ G is not closed under functional composition and hence not a group. This set is 2-transitive on ℤ|G| if the underlying groupG is not hamiltonian and not abelian. Moreover, if the order ofG is not a power of 2, then the set of transformations contains an odd permutation. An important consequence of these results is that the group generated by the set of transformations is nearly always the symmetric group ℒ|G|. Thus, allowing multiple encryption, any permutation of the message space is attainable. This property is one of the strongest security conditions that can be offered by a private-key encryption system. S. S. Magliveras was supported in part by NSF/NSA Grant Number MDA904-82-H0001, by U.S. West Communications, and by the Center for Communication and Information Science of the University of Nebraska.  相似文献   
2.
文章讨论的基于“替换法”的汉字信息加、解密实现技术,改变了传统的汉字加密结果,使加密后的密文仍是可以识别和再利用的汉字,发送者可以在任何可编辑汉字的通讯设备上发送和接收密文,确保中文信息传输过程中的安全性。加、解密算法实现的代码语言为VFP6.0。  相似文献   
3.
陶志勇  杨静 《信息技术》2003,27(4):51-53
电子商务中信息传输与共享技术是电子商务的核心技术 ,电子商务是以Internet为基础的新兴产业 ,保护信息的安全无疑是十分重要的 ,人们越来越多地使用计算机网络来传送对安全敏感的信息 ,所以在信息传输域共享中 ,认证业务、保密业务、数据完整性业务、不可否认业务是当前电子商务急需解决的关键技术 ,本文对这方面做了一些探讨并提出自己的看法  相似文献   
4.
全光网中基于FBG的OADM设计研究   总被引:2,自引:1,他引:1       下载免费PDF全文
提出一种全新的OADM(Optical Add—Drop Multiplexers)结构设计,此结构仅采用一个多端口环行器,大大减少了环行器的数量,节约了成本。若要上/下路一个波长.则只需要一个FBG(Fiber Bragg Grating);若要同时上/下路多个波长,则需要2m个FBG。计算机仿真实验证明此结构比H.Yuan提出的结构具有更低的损耗.对全光网络的实现具有重大的意义。  相似文献   
5.
Some New Results on Key Distribution Patterns and Broadcast Encryption   总被引:1,自引:0,他引:1  
This paper concerns methods by which a trusted authority can distribute keys and/or broadcast a message over a network, so that each member of a privileged subset of users can compute a specified key or decrypt the broadcast message. Moreover, this is done in such a way that no coalition is able to recover any information on a key or broadcast message they are not supposed to know. The problems are studied using the tools of information theory, so the security provided is unconditional (i.e., not based on any computational assumption).In a recent paper st95a, Stinson described a method of constructing key predistribution schemes by combining Mitchell-Piper key distribution patterns with resilient functions; and also presented a construction method for broadcast encryption schemes that combines Fiat-Naor key predistribution schemes with ideal secret sharing schemes. In this paper, we further pursue these two themes, providing several nice applications of these techniques by using combinatorial structures such as orthogonal arrays, perpendicular arrays, Steiner systems and universal hash families.  相似文献   
6.
氩离子激光掺铒光纤的双稳态   总被引:2,自引:0,他引:2  
分析了掺铒光纤双稳态(EDFOB)的工作原理、工作条件和特性,并利用氩离子激光(514.5nm)实现了EDFOB的低功率(<10mW)运转。实验与理论结果基本相符。  相似文献   
7.
为平衡混沌映射中结构与性能的关系,保证加密系统安全性,提出一种基于余弦-指数混沌映射的分块图像加密算法。首先,通过非线性指数项对引入了Tent种子映射的余弦映射进行调制,构造新型余弦-指数混沌映射,并利用SHA-256函数产生与明文相关的密钥,生成随机性较强的混沌序列,实现一次一密;然后,基于拉丁方和位级转换,通过两轮拉丁方索引和比特位拼接,分别设计双重拉丁方和扩展比特位算法,并结合二维约瑟夫序列,对块间预置乱后的明文进行块内置乱,实现不同分块的差异化置乱;最后,基于Zig-Zag变换,采用环状仿Zig-Zag变换设计交叉Zig-Zag变换方法,将中间密文与混沌序列进行双向非线性扩散,实现同时改变像素位置与大小,完成图像加密。实验结果表明,该算法密钥空间大,能有效抵御差分分析和统计分析等典型攻击,具有较好的加密效果。  相似文献   
8.
A JPEG image encryption with the adaptive key and run consistency of MCUs is proposed. The chosen-plaintext attack (CPA) is given here on this encryption scheme. First, the adaptive key can be reproduced from the encrypted image, so that the plaintext images with the same adaptive key can be constructed. Second, the existence of run consistency of MCUs (RCM) between the original image and the encrypted image facilitates rapid estimation. In addition, the single swap for the runs of MCUs with RCM is designed for more accurate estimation. Detailed cryptanalytic results suggest that this encryption scheme can only be used to realize perceptual encryption but not to provide content protection for digital images. Furthermore, applications of the CPA to break other encryption schemes with RCM are presented.  相似文献   
9.
All-optical responsive nanomaterials, which can rapidly switch between two stable states, have been regarded as the next-generation memories due to their potential to realize binary information storage and implement on-chip, integrated photonic neuromorphic systems. Rare earth oxides are preeminent candidates owing to their extraordinary luminescent stability and narrow optical transitions. However, due to the lack of simple and effective optical switches, it is difficult to realize all-optical data storage, encoding, and retrieval by pure rare earth-doped luminescent nanoparticles. Here, a rapid and high-contrast of 104 luminescent switching of Y2O3:Eu3+ nanoparticle between the enhancement and quenching states is achieved by employing the strong light confinement and ultrafast thermal response of localized surface plasmon resonance. A self-encrypted all-optical memory is presented with optical information writing, encryption, reading, and re-writing, and a high-sensitivity synaptic response of emitters to frequency and light intensity flux, which can be harnessed to encrypt information flows and promote convenient and high-security information encryption. Such a convenient and secure plasmonic thermally assisted self-encrypting luminescent switch paves the way for constructing high-performance stimuli-responsive rare earth oxide crystals on demand and expanding their applications in various data encryption, anti-counterfeiting, and rewritable colouration devices.  相似文献   
10.
Nonvolatile organic photonic transistor (OPT) memories have attracted widespread attention due to their nondestructive readout, remote controllability, and robust tunability. Developing electrets with similar molecular structures but different memory behaviors and light-responsive features is crucial for light-wavelength-modulated data encryption. However, reported OPT memories have yet to meet this challenge. Here a new electret molecule (“H-PDI”) is developed via reconfiguring the linear perylene diimide molecule (“L-PDI”) to a helical shape. Respectively incorporating H-PDI and L-PDI into the floating gate layer results to H-PDI OPT and L-PDI OPT. Attributing to their remarkably different electronic structures and energy bandgaps, H-PDI OPT and L-PDI OPT preferably respond to 405 and 532 nm light irradiation, respectively. Upon electrical programming, data can be written and stored in both memories with good retention features and a high “1”/“0” state current ratio over 105, though the data can only be erased by light with correct wavelengths, rather than the electrical field. Moreover, data stored in a memory array consisting of both H-PDI OPT and L-PDI OPT can only be read out by correct inputs, and wrong inputs will lead to highly deceptive outputs. This study provides a general design strategy of OPT for advanced data encryption and protection.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号