全文获取类型
收费全文 | 64篇 |
免费 | 3篇 |
专业分类
化学工业 | 13篇 |
金属工艺 | 2篇 |
机械仪表 | 1篇 |
轻工业 | 3篇 |
无线电 | 15篇 |
一般工业技术 | 10篇 |
冶金工业 | 8篇 |
自动化技术 | 15篇 |
出版年
2024年 | 1篇 |
2023年 | 1篇 |
2022年 | 2篇 |
2021年 | 2篇 |
2020年 | 3篇 |
2018年 | 3篇 |
2017年 | 4篇 |
2015年 | 2篇 |
2014年 | 4篇 |
2013年 | 2篇 |
2012年 | 3篇 |
2011年 | 1篇 |
2010年 | 3篇 |
2009年 | 5篇 |
2008年 | 4篇 |
2007年 | 2篇 |
2006年 | 3篇 |
2004年 | 2篇 |
2003年 | 1篇 |
2000年 | 1篇 |
1999年 | 2篇 |
1998年 | 5篇 |
1997年 | 3篇 |
1996年 | 1篇 |
1995年 | 2篇 |
1994年 | 1篇 |
1992年 | 1篇 |
1989年 | 1篇 |
1985年 | 1篇 |
1978年 | 1篇 |
排序方式: 共有67条查询结果,搜索用时 0 毫秒
11.
Efficient identity-based GQ multisignatures 总被引:1,自引:0,他引:1
ISO/IEC 14888 specifies a variety of digital signature mechanisms to sign messages of arbitrary length. These schemes can
be applied to provide entity authentication, data origin authentication, non-repudiation, and data integrity verification.
ISO/IEC 14888 consists of three parts under the general title Information technology—Security techniques—Digital signatures.
Part II, or ISO/IEC 14888-2 specifies the general structure and the fundamental procedures for the generation and verification
of an identity-based signature (IBS) mechanism for messages of arbitrary length. Particularly, the IBS scheme of Guillou and
Quisquater (GQ) is described in Clauses 6–8. In this paper, an efficient identity-based multisignature (IBMS) scheme is proposed
for the GQ IBS scheme, which allows multiple users using the ISO/IEC 14888-2 standard GQ scheme to generate multisignatures.
The scheme is efficient in the sense that both the length and the verification time of the multisignatures are fixed. The
proposed ID-based multisignature scheme is also secure against forgeability under adaptive chosen-message attack and adaptive
chosen-identity attack in random oracle model. 相似文献
12.
Hilde Lea Lein Kjell Wiik Mari-ann Einarsrud Tor Grande Edgar Lara-curzio 《Journal of the American Ceramic Society》2006,89(9):2895-2898
Steady-state compressive creep rate of La0.5 Sr0.5 Fe0.5 Co0.5 O3−δ (LSFC) and La0.5 Sr0.5 CoO3−δ (LSC) is reported in the temperature region 900°–1050°C and stress range 5–28 MPa. The stress exponents for the two materials were 1.71±0.18 and 1.24±0.15, respectively. The activation energy for creep was considerably higher for LSC (619±56 kJ/mol) than for LSFC (392±28 kJ/mol). The grain size exponent for LSC was 1.28±0.14. Considerably higher creep rates were observed for both materials in N2 compared with air. Relaxation by creep of chemical-induced stresses in oxygen-permeable membranes is addressed, especially at low partial pressure of oxygen. 相似文献
13.
A revised scientific instrument to measure simultaneously kinetic temperatures of different atoms from their optical emission profile is reported. Emission lines are simultaneously detected using one single scanning Fabry-Perot-interferometer (FPI) for a combined spectroscopic setup to acquire different emission lines simultaneously. The setup consists in a commercial Czerny-Turner spectrometer configuration which is combined with a scanning Fabry-Perot interferometer. The fast image acquisition mode of an intensified charge coupled device camera allows the detection of a wavelength interval of interest continuously while acquiring the highly resolved line during the scan of the FPI ramp. Results using this new setup are presented for the simultaneous detection of atomic nitrogen and oxygen in a high enthalpy air plasma flow as used for atmospheric re-entry research and their respective kinetic temperatures derived from the measured line profiles. The paper presents the experimental setup, the calibration procedure, and an exemplary result. The determined temperatures are different, a finding that has been published so far as due to a drawback of the experimental setup of sequential measurements, and which has now to be investigated in more detail. 相似文献
14.
15.
Zheng Zhang Yanan Liu Qinyuan Zuo Lein Harn Shuo Qiu Yuan Cheng 《计算机、材料和连续体(英文)》2020,64(2):1261-1280
Physical Unclonable Functions (PUFs) can be seen as kind of hardware oneway functions, who are easily fabricated but difficult to clone, duplicate or predict.Therefore, PUFs with unclonable and unpredictable properties are welcome to be appliedin designing lightweight cryptography protocols. In this paper, a Basic Key Distribution Scheme (Basic-KDS) based on PUFs is firstly proposed. Then, by employing different deployment modes, a Random Deployment Key Distribution Scheme (RD-KDS) and a Grouping Deployment Key Distribution Scheme (GD-KDS) are further proposed based on the Basic-KDS for large scale wireless sensor networks. In our proposals, a sensor is not pre-distributed with any keys but will generate one by the embedded PUF when receiving a challenge from the gateway, which provides perfect resilience against sensor capture attacks. Besides, the unclonable and unpredictable properties of PUF guarantee the key uniqueness and two-way authentication. Analysis and experiment results show that our proposals have better performances in improving the resilience, secureconnectivity, and efficiency as compared to other schemes. 相似文献
16.
Neural Interfaces: Nanoporous Gold Biointerfaces: Modifying Nanostructure to Control Neural Cell Coverage and Enhance Electrophysiological Recording Performance (Adv. Funct. Mater. 3/2017)
下载免费PDF全文

17.
18.
Chien-Tien Chen Yu-Chang Chang Pin-Xuan Tseng Chien-I Lein Shiang-Fu Hung Hsyueh-Liang Wu 《International journal of molecular sciences》2023,24(1)
Several 2-substituted (H, Ph, and S-Me) and 1-substituted (H, Ph, and Bn), 3-hydroxy-1,3-quinazolin(di)ones were utilized for the first time as radical trapping agents in asymmetric 1,2-oxytrifluoromethylation of styrenes catalyzed by chiral vanadyl methoxide complexes bearing 3,5-disubstituted-N-salicylidene-t-leucinate templates. The effects of catalysts and solvents on the asymmetric induction were systematically examined. The best and complementary scenarios involved the use of vanadyl complexes V(O)-1 and V(O)-2, which bear 3-(2,5-dimethyl)phenyl-5-bromophenyl and 3-t-butyl-5-bromophenyl groups in an i-propanol solvent at ambient temperature. The corresponding (R)-cross-coupling products by V(O)-1 were obtained in 45–71% (for 2-substituted series) and 59–93% yields (for 1-substituted series) for p-/m-methylstyrenes and m-halo/CF3/CO2Me-styrenes in 38–63% ees (the best in 2-H case) and 60–84% ees (the best in 1-benzyl cases), respectively. The corresponding (S)-cross-coupling products by V(O)-2 were obtained in 28–55% (for 2-substituted series) and 45–72% yields (for 1-substituted series) for the same substrate class in 50–91% ees (85–91% ees in 2-phenyl cases) and 64–75% ees (up to 74–75% ees for each 1-H, Ph, and Bn cases), respectively. Theoretical calculations were carried out to explain the origin and extent of enantiocontrols. They both may serve as potential inhibitors of acetohydroxyacid synthase and epidermal growth factor receptor (EGFR) kinases. 相似文献
19.
The type of centralized group key establishment protocols is the most commonly used one due to its efficiency in computation and communication. A key generation center (KGC) in this type of protocols acts as a server to register users initially. Since the KGC selects a group key for group communication, all users must trust the KGC. Needing a mutually trusted KGC can cause problem in some applications. For example, users in a social network cannot trust the network server to select a group key for a secure group communication. In this paper, we remove the need of a mutually trusted KGC by assuming that each user only trusts himself. During registration, each user acts as a KGC to register other users and issue sub-shares to other users. From the secret sharing homomorphism, all sub-shares of each user can be combined into a master share. The master share enables a pairwise shared key between any pair of users. A verification of master shares enables all users to verify their master shares are generated consistently without revealing the master shares. In a group communication, the initiator can become the server to select a group key and distribute it to each other user over a pairwise shared channel. Our design is unique since the storage of each user is minimal, the verification of master shares is efficient and the group key distribution is centralized. There are public-key based group key establishment protocols without a trusted third party. However, these protocols can only establish a single group key. Our protocol is a non-public-key solution and can establish multiple group keys which is computationally efficient. 相似文献
20.
The chemical and physical compatibility of the proton conducting electrolyte material LaNbO4 with the potential partner materials LaMO3 (MMn, Fe, Co) and La2NiO4 is investigated via the reaction of fine-grained powders and solid-state diffusion couples. Results show generally good chemical compatibility for LaNbO4 with perovskite type compositions, particularly the LaFeO3 and LaMnO3 systems. In contrast, Ruddlesden–Popper type phases are predicted to be poor candidates for use with LaNbO4. Investigation of the La2O3–NiO–Nb2O5 and La2O3–CoO–Nb2O5 phase diagrams finds two new perovskite-related materials of stoichiometry LaNb1/3M2/3O3 (MNi, Co), and indicates coexistence of LaNbO4 with the binary oxides NiO and CoO. Additionally, reduction of a LaNbO4–NiO composite confirms coexistence of LaNbO4 with Ni, and so it is concluded that doped-LaMO3|LaNbO4|Ni-LaNbO4 type electrochemical cells may be manufactured via a direct co-firing route without the formation of secondary phases at inter-phase boundaries. 相似文献