全文获取类型
收费全文 | 101篇 |
免费 | 9篇 |
国内免费 | 5篇 |
专业分类
电工技术 | 12篇 |
综合类 | 5篇 |
化学工业 | 10篇 |
金属工艺 | 2篇 |
机械仪表 | 8篇 |
建筑科学 | 9篇 |
矿业工程 | 1篇 |
能源动力 | 7篇 |
轻工业 | 1篇 |
水利工程 | 2篇 |
石油天然气 | 9篇 |
无线电 | 22篇 |
一般工业技术 | 7篇 |
冶金工业 | 5篇 |
自动化技术 | 15篇 |
出版年
2022年 | 1篇 |
2021年 | 4篇 |
2020年 | 8篇 |
2019年 | 10篇 |
2018年 | 5篇 |
2017年 | 5篇 |
2016年 | 7篇 |
2014年 | 5篇 |
2013年 | 3篇 |
2012年 | 4篇 |
2011年 | 8篇 |
2010年 | 6篇 |
2009年 | 8篇 |
2008年 | 4篇 |
2007年 | 4篇 |
2006年 | 1篇 |
2005年 | 5篇 |
2004年 | 4篇 |
2003年 | 4篇 |
2002年 | 2篇 |
2001年 | 1篇 |
1996年 | 2篇 |
1995年 | 2篇 |
1993年 | 2篇 |
1992年 | 2篇 |
1984年 | 1篇 |
1982年 | 2篇 |
1981年 | 1篇 |
1978年 | 1篇 |
1974年 | 1篇 |
1973年 | 1篇 |
1972年 | 1篇 |
排序方式: 共有115条查询结果,搜索用时 17 毫秒
81.
Wade A. Fagen João W. Cangussu Ram Dantu 《Journal of Network and Computer Applications》2009,32(1):184-214
The testing of network-based solutions demands a series of tedious tasks such as the deployment of the solution at different nodes and the configuration of different topologies. The manual execution of these tasks is very time consuming and a configurable environment to facilitate these tasks and consequently improve testing performance is desired. In this paper a virtual network environment that can be easily re-configured is presented to address this problem. The environment has been evaluated by a series of case studies: one dealing with the deployment and containment of a worm propagation attack and one dealing with detecting a denial of service attack. Three smaller case studies have also been developed. The results are a clear indication of the flexibility and usefulness of the virtual network environment. 相似文献
82.
83.
84.
Fagen LiAuthor Vitae Muhammad Khurram KhanAuthor Vitae 《Future Generation Computer Systems》2012,28(1):306-310
Signcryption is a high performance cryptographic primitive that fulfills both the functions of digital signature and public key encryption simultaneously, at a cost significantly lower than that required by the traditional signature-then-encryption approach. In this paper, we introduce biometrics into identity-based signcryption. We formalize the notion of biometric identity-based signcryption and propose an efficient biometric identity-based signcryption scheme that uses biometric information to construct the public key. We prove that our scheme satisfies confidentiality and unforgeability in the random oracle model. We show that both the computational costs and the communication overheads of our scheme are lower than those of the signature-then-encryption approach. 相似文献
85.
The Internet of Things (IoT) is an emerging network paradigm that aims to obtain the interactions among pervasive things through heterogeneous networks. Security is an important task in the IoT. Luo et al. (Secur Commun Netw 7(10): 1560–1569, 2014) proposed a certificateless online/offline signcryption (COOSC) scheme for the IoT (hereafter called LTX). Unfortunately, Shi et al. showed that LTX is not secure. An adversary can easily obtain the private key of a user by a ciphertext. Recently, Li et al. proposed a new COOSC scheme (hereafter called LZZ). However, both LTX and LZZ need a point multiplication operation in the online phase, which is not suitable for resource-constrained devices. To overcome this weakness, we propose a new COOSC scheme and prove its security in the random oracle model. In addition, we analyze the performance of our scheme and show its application in the IoT. 相似文献
86.
Telecommunication Systems - The concept of deniably authenticated encryption (DAE) is presently significant in cryptography due to its security properties and wide range of application. It achieves... 相似文献
87.
武汉市城市污水水质特征及其处理对策 总被引:7,自引:1,他引:7
对武汉市城市污水的水质化验分析得知,该污水的水质时变化幅度较大、有机污染物浓度较低且溶解性有机物所占的比例不高。该污水的处理方法宜从强化一级处理工艺、生物膜法和BC法等几种工艺中优选,并应根据原水同的变化逐时调整投药量或曝气强度,以便节省运行费用。 相似文献
88.
分布式工作流管理系统是相对于早期的集中式工作流管理系统而言的。在讨论了工作流的基础上引入工作流基于XML的过程定义语言XPDL,提出了一种基于XPDL的分布式工作流管理系统的设计方法。 相似文献
89.
软件架构设计在XP方法中的实施 总被引:3,自引:0,他引:3
XP是适配性的敏捷开发方法,但由于自身“简单设计”的要求和实施过程中对架构设计的弱化,使其只能应用于小规模的系统开发。该文通过引入架构设计对XP方法学进行了扩充,使之能够应用于较复杂的系统。在指出架构设计应适应XP项目实际,针对业务规则的本质需求进行抽象建模的同时,也说明XP项目的特点决定了架构设计是一个迭代的增量开发过程,并阐述了架构设计迭代开发的过程。 相似文献
90.
Deniable authentication is an important security requirement for ad hoc networks. However, all known identity-based deniable authentication (IBDA) protocols are lack of formal security proof which is very important for cryptographic protocol design. In this paper, we propose a non-interactive IBDA protocol using bilinear pairings. Our protocol admits formal security proof in the random oracle model under the bilinear Diffie-Hellman assumption. Our protocol is faster than all known IBDA protocols of its type. In addition, our protocol supports batch verification that can speed up the verification of authenticators. This characteristic makes our protocol useful in ad hoc networks. 相似文献