全文获取类型
收费全文 | 3986篇 |
免费 | 989篇 |
国内免费 | 712篇 |
专业分类
电工技术 | 123篇 |
综合类 | 500篇 |
化学工业 | 196篇 |
金属工艺 | 71篇 |
机械仪表 | 40篇 |
建筑科学 | 171篇 |
矿业工程 | 30篇 |
能源动力 | 36篇 |
轻工业 | 9篇 |
水利工程 | 28篇 |
石油天然气 | 12篇 |
武器工业 | 209篇 |
无线电 | 1087篇 |
一般工业技术 | 190篇 |
冶金工业 | 29篇 |
原子能技术 | 12篇 |
自动化技术 | 2944篇 |
出版年
2024年 | 18篇 |
2023年 | 118篇 |
2022年 | 195篇 |
2021年 | 214篇 |
2020年 | 203篇 |
2019年 | 167篇 |
2018年 | 164篇 |
2017年 | 197篇 |
2016年 | 169篇 |
2015年 | 227篇 |
2014年 | 354篇 |
2013年 | 334篇 |
2012年 | 390篇 |
2011年 | 448篇 |
2010年 | 371篇 |
2009年 | 333篇 |
2008年 | 362篇 |
2007年 | 364篇 |
2006年 | 274篇 |
2005年 | 232篇 |
2004年 | 145篇 |
2003年 | 129篇 |
2002年 | 68篇 |
2001年 | 55篇 |
2000年 | 44篇 |
1999年 | 28篇 |
1998年 | 13篇 |
1997年 | 13篇 |
1996年 | 12篇 |
1995年 | 10篇 |
1994年 | 5篇 |
1993年 | 7篇 |
1992年 | 3篇 |
1991年 | 4篇 |
1990年 | 4篇 |
1989年 | 2篇 |
1988年 | 4篇 |
1985年 | 1篇 |
1981年 | 1篇 |
1980年 | 1篇 |
1979年 | 1篇 |
1978年 | 1篇 |
1977年 | 2篇 |
排序方式: 共有5687条查询结果,搜索用时 31 毫秒
101.
102.
Optimal quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks 总被引:1,自引:0,他引:1
Recently, an image scrambling encryption algorithm of pixel bit based on chaos map was proposed. Considering the algorithm as a typical binary image scrambling/permutation algorithm exerting on plaintext of size M×(8N), this paper proposes a novel optimal method to break it with some known/chosen-plaintexts. The spatial complexity and computational complexity of the attack are only O(32·MN) and O(16·n0·MN) respectively, where n0 is the number of known/chosen-plaintexts used. The method can be easily extended to break any permutation-only encryption scheme exerting on plaintext of size M×N and with L different levels of values. The corresponding spatial complexity and computational complexity are only O(MN) and O(⌈logL(MN)⌉·MN) respectively. In addition, some specific remarks on the performance of the image scrambling encryption algorithm are presented. 相似文献
103.
简要介绍了C2密码的概念,依据参考文献分析了针对C2密码的攻击方法,并为相关安全风险的防范提供了理论依据。 相似文献
104.
We report on the corrosion of austenitic (AISI304) and duplex (2205) stainless steels in H2O/KOH 50% at 120 °C. The research is based on a combination of electrochemical, structural and compositional analyses, aimed at assessing the surface modifications resulting from anodic attack and their impact on corrosion resistance. Linear sweep voltammetry and electrochemical impedance spectrometry measurements were carried out in an air‐tight high‐temperature cell. In‐plane and cross‐sectional SEM micrography, X‐ray diffractometry and EDX profiling were used to characterise samples attacked under electrochemically controlled conditions. Electrochemical results have shown that AISI304 exhibits a complex passivating behaviour, while the anodic electrokinetics of the duplex is characterised by mixed kinetic control. AISI304 was found to fail by intergranular corrosion and to be covered: in passive conditions by acicular compounds and in transpassive conditions by a compact layer of corrosion products. Duplex samples, instead, exhibit an uniform form of corrosion morphology and bear a compact layer of corrosion products both in passive and in transpassive conditions. 相似文献
105.
time of data remanence is reduced by 82% while the operation power consumption only increases by 7%. 相似文献
106.
根据激光制导炸弹在空中的运动规律,首先将其在空中的六自由度运动方程分解为纵向、横向两个平面内的运动,然后结合激光制导炸弹的控制规律,得到其在空中弹道的数学模型.在VC++6.0环境下对此弹道进行仿真,再设计合适的算法求出激光制导炸弹投放域的边界,最终得出激光制导炸弹在横向、纵向两个平面内的可投放域.仿真结果显示出不同的投放条件对激光制导炸弹可投放域的影响,为攻击机投放激光制导炸弹的战术决策提供了一些依据. 相似文献
107.
108.
对安全协议的一些新攻击 总被引:1,自引:0,他引:1
论文提出了很多对安全协议进行的新攻击,并且讨论将来如何避免设计不正确协议的方法。 相似文献
109.
Parallel Collision Search with Cryptanalytic Applications 总被引:16,自引:0,他引:16
A simple new technique of parallelizing methods for solving search problems which seek collisions in pseudorandom walks is
presented. This technique can be adapted to a wide range of cryptanalytic problems which can be reduced to finding collisions.
General constructions are given showing how to adapt the technique to finding discrete logarithms in cyclic groups, finding
meaningful collisions in hash functions, and performing meet-in-the-middle attacks such as a known-plaintext attack on double
encryption. The new technique greatly extends the reach of practical attacks, providing the most cost-effective means known
to date for defeating: the small subgroup used in certain schemes based on discrete logarithms such as Schnorr, DSA, and elliptic
curve cryptosystems; hash functions such as MD5, RIPEMD, SHA-1, MDC-2, and MDC-4; and double encryption and three-key triple
encryption. The practical significance of the technique is illustrated by giving the design for three $10 million custom machines
which could be built with current technology: one finds elliptic curve logarithms in GF(2155) thereby defeating a proposed elliptic curve cryptosystem in expected time 32 days, the second finds MD5 collisions in expected
time 21 days, and the last recovers a double-DES key from two known plaintexts in expected time 4 years, which is four orders
of magnitude faster than the conventional meet-in-the-middle attack on double-DES. Based on this attack, double-DES offers
only 17 more bits of security than single-DES.
Received 21 December 1995 and revised 24 September 1996 相似文献
110.
氢蚀对15CrMo钢疲劳裂纹扩展寿命的影响 总被引:1,自引:0,他引:1
对15CrMo钢在氢蚀环境下和疲劳裂纹行为作了研究,重点考察了不同温度、压力和时间等情况下的扩展特性,并找出了对Paris公式中系数的影响趋势。 相似文献