全文获取类型
收费全文 | 149篇 |
免费 | 36篇 |
国内免费 | 44篇 |
专业分类
综合类 | 12篇 |
机械仪表 | 1篇 |
建筑科学 | 1篇 |
矿业工程 | 3篇 |
石油天然气 | 3篇 |
武器工业 | 1篇 |
无线电 | 47篇 |
一般工业技术 | 1篇 |
冶金工业 | 28篇 |
自动化技术 | 132篇 |
出版年
2023年 | 3篇 |
2022年 | 4篇 |
2021年 | 5篇 |
2020年 | 4篇 |
2019年 | 7篇 |
2018年 | 5篇 |
2017年 | 2篇 |
2016年 | 8篇 |
2015年 | 4篇 |
2014年 | 19篇 |
2013年 | 23篇 |
2012年 | 17篇 |
2011年 | 17篇 |
2010年 | 16篇 |
2009年 | 21篇 |
2008年 | 14篇 |
2007年 | 10篇 |
2006年 | 4篇 |
2005年 | 9篇 |
2004年 | 9篇 |
2003年 | 8篇 |
2002年 | 6篇 |
2001年 | 4篇 |
2000年 | 1篇 |
1999年 | 1篇 |
1998年 | 1篇 |
1983年 | 3篇 |
1982年 | 1篇 |
1981年 | 1篇 |
1973年 | 1篇 |
1963年 | 1篇 |
排序方式: 共有229条查询结果,搜索用时 187 毫秒
1.
2.
Radio frequency identification (RFID) system is a contactless automatic identification system, which uses small and low cost RFID tags. The primary problem of current security and privacy preserving schemes is that, in order to identify only one single tag, these schemes require a linear computational complexity on the server side. We propose an efficient mutual authentication protocol for passive RFID tags that provides confidentiality, untraceability, mutual authentication, and efficiency. The proposed protocol shifts the heavy burden of asymmetric encryption and decryption operations on the more powerful server side and only leaves lightweight hash operation on tag side. It is also efficient in terms of time complexity, space complexity, and communication cost, which are very important for practical large-scale RFID applications. 相似文献
3.
互联网的广泛应用给军队开展政治工作带来了机遇与挑战,文章从思想政治教育、军事宣传工作和安全保密工作三个方面,从内容与形式两个维度对互联网环境下开展政治工作的创新进行了深入探讨,提出了顺势而为开展思想政治教育,充分利用互联网手段开展军事宣传工作和趋利避害做好安全保密工作的思路和方法。 相似文献
4.
随着网络的发展和无线Wi Fi业务的应用不断普及,无线局域网安全保密性能得到了广泛的重视。本文对无线局域网的安全体系进行分析,研究无线局域网安全保密管控方案,通过性能测试证明本文所设计的无线局域网安全保密管控方案的可行性。 相似文献
5.
6.
为保证用户数据的机密性,业界普遍将数据加密后存储在云端。提出了一种云存储系统中保障数据机密性的方法,其特点有:(1)加解密系统部署于云存储服务器的前端,在客户端和云存储服务器之间对用户数据进行加解密;(2)对用户数据的加解密是实时进行的,在数据上传的传输过程中进行加密,在数据下载的传输过程中进行解密;(3)加解密系统对用户端和云服务器端是透明的。当前广泛使用的基于HTTP协议传输的云存储系统如Amazon S3、OpenStack Swift等可以直接使用该方法。测试结果表明:本方法在不降低数据传输吞吐率的基础上,能有效卸载云存储系统的数据加解密负担。 相似文献
7.
Wayne Madsen 《Information Security Journal: A Global Perspective》2013,22(1):11-16
ABSTRACT Communicating with confidential data requires special attention in a mobile agents environment, especially when the other hosts must be prevented from eavesdropping on the communication. We propose a communication model for secured communication between the agents belonging to publishers and consumers data. Confidentiality is ensured using our on-the-fly encryption-decryption sequence using ElGamal system to directly convert the message or plaintext into one that is encrypted directly with the public key of consumer. The scheme ensures that the data possessed by the agents is secured at all times when it is executing at any untrusted host. Our minimal implementation of the model with Aglets agent platform gives the first faithful picture of the happenings in the model. Finally, we also explain how the homomorphic property of ElGamal scheme can be integrated with our model for a Web-based application such as voting involving multiple agents. 相似文献
8.
The Internet of Things (IoT) is converting today’s physical world into a complex and sophisticated network of connected devices on an enormous scale. The existing malicious node detection mechanism in traditional approaches lacks in transparency, availability, or traceability of the detection phase. To overcome these concerns, we provide a decentralized technique using blockchain technology. Despite the fact that blockchain technology is applicable to create that type of models, existing harmony set of instructions are susceptible to do violence to such as DoS and Sybil, making blockchain systems unfeasible. Here, a new Proof-of-Improved-Participation (PoIP) harmony instruction was suggested that benefits the participation rules to select honest peers for mining while limiting malicious peers. Under an evaluation the PoIP outperforms the Proof-of-Work (PoW) instructions are demonstrated, Proof of Stake (PoS) instructions in terms of energy consumption, accuracy, and bandwidth. To compare the three consensus protocols with respect to efficiency, we build a lightweight mining model and find that PoIP consensus has greater efficiency than PoW and PoS. PoIP has 25% lower attack risk than existing consensus. As a consequence, our suggested methodology can provide the needed security with minimal attack risk and high accuracy, according to the analysis results. As a result, suggested consensus is more efficient than existing methods in terms of block generation time. Hence we suggest that suggested consensus is very suitable for IoT-based applications especially in healthcare. 相似文献
9.
10.