全文获取类型
收费全文 | 129篇 |
免费 | 3篇 |
专业分类
化学工业 | 9篇 |
机械仪表 | 1篇 |
能源动力 | 1篇 |
轻工业 | 4篇 |
无线电 | 22篇 |
一般工业技术 | 12篇 |
冶金工业 | 31篇 |
原子能技术 | 7篇 |
自动化技术 | 45篇 |
出版年
2022年 | 1篇 |
2021年 | 1篇 |
2020年 | 3篇 |
2018年 | 7篇 |
2017年 | 2篇 |
2016年 | 3篇 |
2015年 | 3篇 |
2014年 | 3篇 |
2013年 | 5篇 |
2012年 | 10篇 |
2011年 | 3篇 |
2010年 | 5篇 |
2008年 | 4篇 |
2007年 | 7篇 |
2006年 | 4篇 |
2005年 | 2篇 |
2004年 | 2篇 |
2003年 | 5篇 |
2001年 | 4篇 |
2000年 | 3篇 |
1999年 | 3篇 |
1998年 | 8篇 |
1997年 | 2篇 |
1996年 | 5篇 |
1995年 | 5篇 |
1994年 | 5篇 |
1993年 | 4篇 |
1990年 | 1篇 |
1989年 | 4篇 |
1988年 | 2篇 |
1986年 | 1篇 |
1985年 | 1篇 |
1984年 | 2篇 |
1983年 | 2篇 |
1982年 | 1篇 |
1981年 | 2篇 |
1980年 | 3篇 |
1979年 | 1篇 |
1977年 | 1篇 |
1966年 | 1篇 |
1964年 | 1篇 |
排序方式: 共有132条查询结果,搜索用时 0 毫秒
131.
Motivated by applications in large storage systems, we initiate the study of incremental deterministic public-key encryption. Deterministic public-key encryption, introduced by Bellare, Boldyreva, and O’Neill (CRYPTO ’07), provides an alternative to randomized public-key encryption in various scenarios where the latter exhibits inherent drawbacks. A deterministic encryption algorithm, however, cannot satisfy any meaningful notion of security for low-entropy plaintexts distributions, but Bellare et al. demonstrated that a strong notion of security can in fact be realized for relatively high-entropy plaintext distributions. In order to achieve a meaningful level of security, a deterministic encryption algorithm should be typically used for encrypting rather long plaintexts for ensuring a sufficient amount of entropy. This requirement may be at odds with efficiency constraints, such as communication complexity and computation complexity in the presence of small updates. Thus, a highly desirable property of deterministic encryption algorithms is incrementality: Small changes in the plaintext translate into small changes in the corresponding ciphertext. We present a framework for modeling the incrementality of deterministic public-key encryption. Our framework extends the study of the incrementality of cryptography primitives initiated by Bellare, Goldreich and Goldwasser (CRYPTO ’94). Within our framework, we propose two schemes, which we prove to enjoy an optimal tradeoff between their security and incrementality up to lower-order factors. Our first scheme is a generic method which can be based on any deterministic public-key encryption scheme, and, in particular, can be instantiated with any semantically secure (randomized) public-key encryption scheme in the random-oracle model. Our second scheme is based on the Decisional Diffie–Hellman assumption in the standard model. The approach underpinning our schemes is inspired by the fundamental “sample-then-extract” technique due to Nisan and Zuckerman (JCSS ’96) and refined by Vadhan (J. Cryptology ’04), and by the closely related notion of “locally computable extractors” due to Vadhan. Most notably, whereas Vadhan used such extractors to construct private-key encryption schemes in the bounded-storage model, we show that techniques along these lines can also be used to construct incremental public-key encryption schemes. 相似文献
132.
Alcohol and nicotine are widely abused legal substances worldwide. Relapse to alcohol or tobacco seeking and consumption after abstinence is a major clinical challenge, and is often evoked by cue-induced craving. Therefore, disruption of the memory for the cue–drug association is expected to suppress relapse. Memories have been postulated to become labile shortly after their retrieval, during a “memory reconsolidation” process. Interference with the reconsolidation of drug-associated memories has been suggested as a possible strategy to reduce or even prevent cue-induced craving and relapse. Here, we surveyed the growing body of studies in animal models and in humans assessing the effectiveness of pharmacological or behavioral manipulations in reducing relapse by interfering with the reconsolidation of alcohol and nicotine/tobacco memories. Our review points to the potential of targeting the reconsolidation of these memories as a strategy to suppress relapse to alcohol drinking and tobacco smoking. However, we discuss several critical limitations and boundary conditions, which should be considered to improve the consistency and replicability in the field, and for development of an efficient reconsolidation-based relapse-prevention therapy. 相似文献