全文获取类型
收费全文 | 134篇 |
免费 | 62篇 |
国内免费 | 66篇 |
专业分类
电工技术 | 1篇 |
综合类 | 23篇 |
化学工业 | 1篇 |
轻工业 | 1篇 |
无线电 | 63篇 |
一般工业技术 | 2篇 |
自动化技术 | 171篇 |
出版年
2024年 | 2篇 |
2023年 | 3篇 |
2022年 | 3篇 |
2021年 | 7篇 |
2020年 | 8篇 |
2019年 | 9篇 |
2018年 | 9篇 |
2017年 | 7篇 |
2016年 | 9篇 |
2015年 | 19篇 |
2014年 | 21篇 |
2013年 | 17篇 |
2012年 | 26篇 |
2011年 | 25篇 |
2010年 | 24篇 |
2009年 | 17篇 |
2008年 | 12篇 |
2007年 | 19篇 |
2006年 | 10篇 |
2005年 | 9篇 |
2004年 | 2篇 |
2003年 | 2篇 |
2002年 | 1篇 |
2001年 | 1篇 |
排序方式: 共有262条查询结果,搜索用时 31 毫秒
1.
2.
Yudi ZHANG Debiao HE Mingwu ZHANG Kim-Kwang Raymond CHOO 《Frontiers of Computer Science》2020,14(3):143803-215
Mobile devices are widely used for data access,communications and storage.However,storing a private key for signature and other cryptographic usage on a single mobile device can be challenging,due to its computational limitations.Thus,a number of(t,n)threshold secret sharing schemes designed to minimize private key from leakage have been proposed in the literature.However,existing schemes generally suffer from key reconstruction attack.In this paper,we propose an efficient and secure two-party distributed signing protocol for the SM2 signature algorithm.The latter has been mandated by the Chinese government for all electronic commerce applications.The proposed protocol separates the private key to storage on two devices and can generate a valid signature without the need to reconstruct the entire private key.We prove that our protocol is secure under nonstandard assumption.Then,we implement our protocol using MIRACL Cryptographic SDK to demonstrate that the protocol can be deployed in practice to prevent key disclosure. 相似文献
3.
Cloud computing and storage services allow clients to move their data center and applications to centralized large data centers and thus avoid the burden of local data storage and maintenance.However,this poses new challenges related to creating secure and reliable data storage over unreliable service providers.In this study,we address the problem of ensuring the integrity of data storage in cloud computing.In particular,we consider methods for reducing the burden of generating a constant amount of metadata at the client side.By exploiting some good attributes of the bilinear group,we can devise a simple and efficient audit service for public verification of untrusted and outsourced storage,which can be important for achieving widespread deployment of cloud computing.Whereas many prior studies on ensuring remote data integrity did not consider the burden of generating verification metadata at the client side,the objective of this study is to resolve this issue.Moreover,our scheme also supports data dynamics and public verifiability.Extensive security and performance analysis shows that the proposed scheme is highly efficient and provably secure. 相似文献
4.
针对物联网感知层节点计算、存储能力受限情况下,多用户安全高效的资源访问需求,提出一种分层访问控制方案.将提供同级别资源的节点划分为一个层次节点,利用层次节点之间形成的偏序关系,设计了安全高效的密钥推导算法,使用户在掌握单个密钥材料的情况下,能够访问更多层次资源.同时引入Merkle树机制,使多个用户通过相互独立的哈希链,安全高效的获取层次节点的密钥材料.方案在存储开销、计算开销、可证明安全和可扩展方面,比现有类似方案更适合多用户在物联网感知层环境下资源的访问. 相似文献
5.
6.
口令认证/密钥交换(PAKE协议)协议允许通信双方利用短小易记的口令在不安全的网络上进行相互认证并建立安全的会话密钥,它有着非常广泛的实际应用背景和重要的理论意义。文章介绍了PAKE协议的研究发展动态、PAKE协议的通信模型和PAKE协议标准化工作的研究进展,分析了现有标准候选协议的优劣,指出了需要进一步研究的问题。 相似文献
7.
分析推导了分布式光伏电源接入区域配电网的影响,在此基础上,考虑主动配电网背景下的灵活网架,以一系列静态安全稳定指标作为约束,建立了分布式光伏电源准入容量求解模型。将单个以及多个光伏电源接入的情况分开求解,相应地分别采用基于二分法的枚举法以及混合智能遗传算法求解,保证了模型求解的高效性。利用所提模型、算法,对10 k V中压配电网的几种典型网架接线进行分布式光伏电源准入容量的计算、比较、分析,验证了方法的有效性,总结了相关规律,提出了建议。 相似文献
8.
本文提出一种基于公钥密码体制(Number Theory Research Unit,NTRU)选择明文攻击(Chosen Plaintext Attack,CPA)可证明安全的全同态加密方案.首先,对NTRU的密钥生成算法进行改进,通过格上的高斯抽象算法生成密钥对,避免了有效的格攻击,同时,没有改变密钥的分布.然后,基于改进的NTRU加密算法,利用Flattening技术,构造了一个全同态加密体制,并在标准模型下证明方案是选择明文攻击不可区分性IND-CPA安全的. 相似文献
9.
10.
To satisfy the requirements of identity authentication and data possession proven in the cloud application scenarios,a provable data possession scheme with authentication was proposed.Based on data tag signature and randomness reusing,the proposed scheme could accomplish several issues with three interactions,including the possession proof of cloud data,the mutual authentication between user and cloud computing server,the session key agreement and confirmation.Compared to the simple combination of authentication key agreement and provable data possession schemes,the proposed scheme has less computation and interactions,and better provable securities.In the random oracle model,the security proof of the proposed scheme is given under the computational Diffie-Hellman assumption. 相似文献