首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   101篇
  免费   9篇
  国内免费   5篇
电工技术   12篇
综合类   5篇
化学工业   10篇
金属工艺   2篇
机械仪表   8篇
建筑科学   9篇
矿业工程   1篇
能源动力   7篇
轻工业   1篇
水利工程   2篇
石油天然气   9篇
无线电   22篇
一般工业技术   7篇
冶金工业   5篇
自动化技术   15篇
  2022年   1篇
  2021年   4篇
  2020年   8篇
  2019年   10篇
  2018年   5篇
  2017年   5篇
  2016年   7篇
  2014年   5篇
  2013年   3篇
  2012年   4篇
  2011年   8篇
  2010年   6篇
  2009年   8篇
  2008年   4篇
  2007年   4篇
  2006年   1篇
  2005年   5篇
  2004年   4篇
  2003年   4篇
  2002年   2篇
  2001年   1篇
  1996年   2篇
  1995年   2篇
  1993年   2篇
  1992年   2篇
  1984年   1篇
  1982年   2篇
  1981年   1篇
  1978年   1篇
  1974年   1篇
  1973年   1篇
  1972年   1篇
排序方式: 共有115条查询结果,搜索用时 17 毫秒
81.
The testing of network-based solutions demands a series of tedious tasks such as the deployment of the solution at different nodes and the configuration of different topologies. The manual execution of these tasks is very time consuming and a configurable environment to facilitate these tasks and consequently improve testing performance is desired. In this paper a virtual network environment that can be easily re-configured is presented to address this problem. The environment has been evaluated by a series of case studies: one dealing with the deployment and containment of a worm propagation attack and one dealing with detecting a denial of service attack. Three smaller case studies have also been developed. The results are a clear indication of the flexibility and usefulness of the virtual network environment.  相似文献   
82.
通过对有关组分油质量情况的综合分析,用常顶汽油、重整抽余油和烷基化油按一定比例进行调合试验,成功生产出符合企业标准(Q/SHQL.01.291-2001)的75#航空活塞式发动机燃料。  相似文献   
83.
84.
Signcryption is a high performance cryptographic primitive that fulfills both the functions of digital signature and public key encryption simultaneously, at a cost significantly lower than that required by the traditional signature-then-encryption approach. In this paper, we introduce biometrics into identity-based signcryption. We formalize the notion of biometric identity-based signcryption and propose an efficient biometric identity-based signcryption scheme that uses biometric information to construct the public key. We prove that our scheme satisfies confidentiality and unforgeability in the random oracle model. We show that both the computational costs and the communication overheads of our scheme are lower than those of the signature-then-encryption approach.  相似文献   
85.
The Internet of Things (IoT) is an emerging network paradigm that aims to obtain the interactions among pervasive things through heterogeneous networks. Security is an important task in the IoT. Luo et al. (Secur Commun Netw 7(10): 1560–1569, 2014) proposed a certificateless online/offline signcryption (COOSC) scheme for the IoT (hereafter called LTX). Unfortunately, Shi et al. showed that LTX is not secure. An adversary can easily obtain the private key of a user by a ciphertext. Recently, Li et al. proposed a new COOSC scheme (hereafter called LZZ). However, both LTX and LZZ need a point multiplication operation in the online phase, which is not suitable for resource-constrained devices. To overcome this weakness, we propose a new COOSC scheme and prove its security in the random oracle model. In addition, we analyze the performance of our scheme and show its application in the IoT.  相似文献   
86.
Ahene  Emmanuel  Jin  Chunhua  Li  Fagen 《Telecommunication Systems》2019,70(3):417-434
Telecommunication Systems - The concept of deniably authenticated encryption (DAE) is presently significant in cryptography due to its security properties and wide range of application. It achieves...  相似文献   
87.
武汉市城市污水水质特征及其处理对策   总被引:7,自引:1,他引:7  
对武汉市城市污水的水质化验分析得知,该污水的水质时变化幅度较大、有机污染物浓度较低且溶解性有机物所占的比例不高。该污水的处理方法宜从强化一级处理工艺、生物膜法和BC法等几种工艺中优选,并应根据原水同的变化逐时调整投药量或曝气强度,以便节省运行费用。  相似文献   
88.
分布式工作流管理系统是相对于早期的集中式工作流管理系统而言的。在讨论了工作流的基础上引入工作流基于XML的过程定义语言XPDL,提出了一种基于XPDL的分布式工作流管理系统的设计方法。  相似文献   
89.
软件架构设计在XP方法中的实施   总被引:3,自引:0,他引:3  
XP是适配性的敏捷开发方法,但由于自身“简单设计”的要求和实施过程中对架构设计的弱化,使其只能应用于小规模的系统开发。该文通过引入架构设计对XP方法学进行了扩充,使之能够应用于较复杂的系统。在指出架构设计应适应XP项目实际,针对业务规则的本质需求进行抽象建模的同时,也说明XP项目的特点决定了架构设计是一个迭代的增量开发过程,并阐述了架构设计迭代开发的过程。  相似文献   
90.
Fagen Li  Pan Xiong  Chunhua Jin 《Computing》2014,96(9):843-853
Deniable authentication is an important security requirement for ad hoc networks. However, all known identity-based deniable authentication (IBDA) protocols are lack of formal security proof which is very important for cryptographic protocol design. In this paper, we propose a non-interactive IBDA protocol using bilinear pairings. Our protocol admits formal security proof in the random oracle model under the bilinear Diffie-Hellman assumption. Our protocol is faster than all known IBDA protocols of its type. In addition, our protocol supports batch verification that can speed up the verification of authenticators. This characteristic makes our protocol useful in ad hoc networks.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号