全文获取类型
收费全文 | 5973篇 |
免费 | 667篇 |
国内免费 | 736篇 |
专业分类
电工技术 | 127篇 |
综合类 | 730篇 |
化学工业 | 79篇 |
金属工艺 | 9篇 |
机械仪表 | 78篇 |
建筑科学 | 122篇 |
矿业工程 | 46篇 |
能源动力 | 24篇 |
轻工业 | 96篇 |
水利工程 | 15篇 |
石油天然气 | 14篇 |
武器工业 | 27篇 |
无线电 | 1962篇 |
一般工业技术 | 182篇 |
冶金工业 | 39篇 |
原子能技术 | 3篇 |
自动化技术 | 3823篇 |
出版年
2024年 | 29篇 |
2023年 | 105篇 |
2022年 | 116篇 |
2021年 | 151篇 |
2020年 | 154篇 |
2019年 | 165篇 |
2018年 | 116篇 |
2017年 | 143篇 |
2016年 | 142篇 |
2015年 | 227篇 |
2014年 | 409篇 |
2013年 | 334篇 |
2012年 | 457篇 |
2011年 | 491篇 |
2010年 | 473篇 |
2009年 | 569篇 |
2008年 | 578篇 |
2007年 | 508篇 |
2006年 | 395篇 |
2005年 | 343篇 |
2004年 | 336篇 |
2003年 | 264篇 |
2002年 | 208篇 |
2001年 | 132篇 |
2000年 | 112篇 |
1999年 | 109篇 |
1998年 | 60篇 |
1997年 | 63篇 |
1996年 | 46篇 |
1995年 | 32篇 |
1994年 | 18篇 |
1993年 | 21篇 |
1992年 | 16篇 |
1991年 | 12篇 |
1990年 | 12篇 |
1989年 | 29篇 |
1988年 | 1篇 |
排序方式: 共有7376条查询结果,搜索用时 234 毫秒
101.
102.
时政新闻是宣传国家政府方针政策的重要传播方式,对社会发展影响巨大。作为媒体新闻工作者,应该积极把握舆论走势,以正确的宣传路径引导民众,提高时政新闻传播的策略能动性,让其更加平民化、个性化,并要始终保持做新闻时的创新意识。本文简要探讨了电视时政新闻在采编和制作过程中需要重视和把握的关键要点。 相似文献
103.
引入数学理念的计算机课程编排系统能够有效地进行课程编排,文章剖析了课程编排系统涉及到的基本概念及需求分析,重点研究了计算机课程编排系统的数学分析,涉及到系统的约束条件、课程编排的数学模型、课程编排的优先级及后续处理。 相似文献
104.
为解决网格技术中证书管理的复杂性问题,提出了无证书两方密钥协商新方案。新方案使用了显示认证方法,在随机预言模型下新方案的安全性得到了证明。只要每方至少有一个未泄露的秘密值,那么新方案就是安全的。新方案适合制造网格多信任域环境需求。与其他制造网格环境下密钥协商协议比较,新方案在计算效率上占优。 相似文献
105.
106.
In order to achieve fine-grained access control in cloud computing, existing digital rights management (DRM) schemes adopt attribute-based encryption as the main encryption primitive. However, these schemes suffer from inefficiency and cannot support dynamic updating of usage rights stored in the cloud. In this paper, we propose a novel DRM scheme with secure key management and dynamic usage control in cloud computing. We present a secure key management mechanism based on attribute-based encryption and proxy re-encryption. Only the users whose attributes satisfy the access policy of the encrypted content and who have effective usage rights can be able to recover the content encryption key and further decrypt the content. The attribute based mechanism allows the content provider to selectively provide fine-grained access control of contents among a set of users, and also enables the license server to implement immediate attribute and user revocation. Moreover, our scheme supports privacy-preserving dynamic usage control based on additive homomorphic encryption, which allows the license server in the cloud to update the users' usage rights dynamically without disclosing the plaintext. Extensive analytical results indicate that our proposed scheme is secure and efficient. 相似文献
107.
Due to the strong attacking ability, fast speed, simple implementation and other characteristics, differential fault analysis has become an important method to evaluate the security of cryptosystem in the Internet of Things. As one of the AES finalists, the Serpent is a 128-bit Substitution-Permutation Network (SPN) cryptosystem. It has 32 rounds with the variable key length between 0 and 256 bits, which is flexible to provide security in the Internet of Things. On the basis of the byte-oriented model and the differential analysis, we propose an effective differential fault attack on the Serpent cryptosystem. Mathematical analysis and simulating experiment show that the attack could recover its secret key by introducing 48 faulty ciphertexts. The result in this study describes that the Serpent is vulnerable to differential fault analysis in detail. It will be beneficial to the analysis of the same type of other iterated cryptosystems. 相似文献
108.
The emergence of quantum computer will threaten the security of existing public-key cryptosystems, including the Diffie Hellman key exchange protocol, encryption scheme and etc, and it makes the study of resistant quantum cryptography very urgent. This motivate us to design a new key exchange protocol and eneryption scheme in this paper. Firstly, some acknowledged mathematical problems was introduced, such as ergodic matrix problem and tensor decomposition problem, the two problems have been proved to NPC hard. From the computational complexity prospective, NPC problems have been considered that there is no polynomial-time quantum algorithm to solve them. From the algebraic structures prospective, non-commutative cryptography has been considered to resist quantum. The matrix and tensor operator we adopted also satisfied with this non-commutative algebraic structures, so they can be used as candidate problems for resisting quantum from perspective of computational complexity theory and algebraic structures. Secondly, a new problem was constructed based on the introduced problems in this paper, then a key exchange protocol and a public key encryption scheme were proposed based on it. Finally the security analysis, efficiency, recommended parameters, performance evaluation and etc. were also been given. The two schemes has the following characteristics, provable security,security bits can be scalable, to achieve high efficiency, quantum resistance, and etc. 相似文献
109.
武汉地铁AFC清分中心作为整个武汉市轨道交通线网AFC系统的发卡中心、清分中心、数据中心和运营管理中心。其中密钥承担着建立轨道交通AFC系统安全密钥体系、生成系统密钥、发行密钥卡和进行密钥管理的任务。文章主要介绍武汉轨道交通清分中心项目密钥发卡实现方式。 相似文献
110.