首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   64篇
  免费   3篇
化学工业   13篇
金属工艺   2篇
机械仪表   1篇
轻工业   3篇
无线电   15篇
一般工业技术   10篇
冶金工业   8篇
自动化技术   15篇
  2024年   1篇
  2023年   1篇
  2022年   2篇
  2021年   2篇
  2020年   3篇
  2018年   3篇
  2017年   4篇
  2015年   2篇
  2014年   4篇
  2013年   2篇
  2012年   3篇
  2011年   1篇
  2010年   3篇
  2009年   5篇
  2008年   4篇
  2007年   2篇
  2006年   3篇
  2004年   2篇
  2003年   1篇
  2000年   1篇
  1999年   2篇
  1998年   5篇
  1997年   3篇
  1996年   1篇
  1995年   2篇
  1994年   1篇
  1992年   1篇
  1989年   1篇
  1985年   1篇
  1978年   1篇
排序方式: 共有67条查询结果,搜索用时 0 毫秒
11.
Efficient identity-based GQ multisignatures   总被引:1,自引:0,他引:1  
ISO/IEC 14888 specifies a variety of digital signature mechanisms to sign messages of arbitrary length. These schemes can be applied to provide entity authentication, data origin authentication, non-repudiation, and data integrity verification. ISO/IEC 14888 consists of three parts under the general title Information technology—Security techniques—Digital signatures. Part II, or ISO/IEC 14888-2 specifies the general structure and the fundamental procedures for the generation and verification of an identity-based signature (IBS) mechanism for messages of arbitrary length. Particularly, the IBS scheme of Guillou and Quisquater (GQ) is described in Clauses 6–8. In this paper, an efficient identity-based multisignature (IBMS) scheme is proposed for the GQ IBS scheme, which allows multiple users using the ISO/IEC 14888-2 standard GQ scheme to generate multisignatures. The scheme is efficient in the sense that both the length and the verification time of the multisignatures are fixed. The proposed ID-based multisignature scheme is also secure against forgeability under adaptive chosen-message attack and adaptive chosen-identity attack in random oracle model.  相似文献   
12.
Steady-state compressive creep rate of La0.5Sr0.5Fe0.5Co0.5O3−δ (LSFC) and La0.5Sr0.5CoO3−δ (LSC) is reported in the temperature region 900°–1050°C and stress range 5–28 MPa. The stress exponents for the two materials were 1.71±0.18 and 1.24±0.15, respectively. The activation energy for creep was considerably higher for LSC (619±56 kJ/mol) than for LSFC (392±28 kJ/mol). The grain size exponent for LSC was 1.28±0.14. Considerably higher creep rates were observed for both materials in N2 compared with air. Relaxation by creep of chemical-induced stresses in oxygen-permeable membranes is addressed, especially at low partial pressure of oxygen.  相似文献   
13.
A revised scientific instrument to measure simultaneously kinetic temperatures of different atoms from their optical emission profile is reported. Emission lines are simultaneously detected using one single scanning Fabry-Perot-interferometer (FPI) for a combined spectroscopic setup to acquire different emission lines simultaneously. The setup consists in a commercial Czerny-Turner spectrometer configuration which is combined with a scanning Fabry-Perot interferometer. The fast image acquisition mode of an intensified charge coupled device camera allows the detection of a wavelength interval of interest continuously while acquiring the highly resolved line during the scan of the FPI ramp. Results using this new setup are presented for the simultaneous detection of atomic nitrogen and oxygen in a high enthalpy air plasma flow as used for atmospheric re-entry research and their respective kinetic temperatures derived from the measured line profiles. The paper presents the experimental setup, the calibration procedure, and an exemplary result. The determined temperatures are different, a finding that has been published so far as due to a drawback of the experimental setup of sequential measurements, and which has now to be investigated in more detail.  相似文献   
14.
张明武  黄嘉骏  韩亮 《软件学报》2021,32(10):3266-3282
随着医疗信息系统的急速发展,基于医疗云的信息系统将大量电子健康记录(EHRs)存储在医疗云系统中,利用医疗云强大的存储能力和计算能力对EHRs数据进行安全与统一的管理.尽管传统加密机制可以保证医疗数据在半诚实云服务器中的机密性,但对加密后的EHRs数据执行安全、快速、有效的范围搜索,仍是一个有待解决的关键问题.提出一种...  相似文献   
15.
    
Physical Unclonable Functions (PUFs) can be seen as kind of hardware oneway functions, who are easily fabricated but difficult to clone, duplicate or predict.Therefore, PUFs with unclonable and unpredictable properties are welcome to be appliedin designing lightweight cryptography protocols. In this paper, a Basic Key Distribution Scheme (Basic-KDS) based on PUFs is firstly proposed. Then, by employing different deployment modes, a Random Deployment Key Distribution Scheme (RD-KDS) and a Grouping Deployment Key Distribution Scheme (GD-KDS) are further proposed based on the Basic-KDS for large scale wireless sensor networks. In our proposals, a sensor is not pre-distributed with any keys but will generate one by the embedded PUF when receiving a challenge from the gateway, which provides perfect resilience against sensor capture attacks. Besides, the unclonable and unpredictable properties of PUF guarantee the key uniqueness and two-way authentication. Analysis and experiment results show that our proposals have better performances in improving the resilience, secureconnectivity, and efficiency as compared to other schemes.  相似文献   
16.
17.
18.
    
Several 2-substituted (H, Ph, and S-Me) and 1-substituted (H, Ph, and Bn), 3-hydroxy-1,3-quinazolin(di)ones were utilized for the first time as radical trapping agents in asymmetric 1,2-oxytrifluoromethylation of styrenes catalyzed by chiral vanadyl methoxide complexes bearing 3,5-disubstituted-N-salicylidene-t-leucinate templates. The effects of catalysts and solvents on the asymmetric induction were systematically examined. The best and complementary scenarios involved the use of vanadyl complexes V(O)-1 and V(O)-2, which bear 3-(2,5-dimethyl)phenyl-5-bromophenyl and 3-t-butyl-5-bromophenyl groups in an i-propanol solvent at ambient temperature. The corresponding (R)-cross-coupling products by V(O)-1 were obtained in 45–71% (for 2-substituted series) and 59–93% yields (for 1-substituted series) for p-/m-methylstyrenes and m-halo/CF3/CO2Me-styrenes in 38–63% ees (the best in 2-H case) and 60–84% ees (the best in 1-benzyl cases), respectively. The corresponding (S)-cross-coupling products by V(O)-2 were obtained in 28–55% (for 2-substituted series) and 45–72% yields (for 1-substituted series) for the same substrate class in 50–91% ees (85–91% ees in 2-phenyl cases) and 64–75% ees (up to 74–75% ees for each 1-H, Ph, and Bn cases), respectively. Theoretical calculations were carried out to explain the origin and extent of enantiocontrols. They both may serve as potential inhibitors of acetohydroxyacid synthase and epidermal growth factor receptor (EGFR) kinases.  相似文献   
19.
The type of centralized group key establishment protocols is the most commonly used one due to its efficiency in computation and communication. A key generation center (KGC) in this type of protocols acts as a server to register users initially. Since the KGC selects a group key for group communication, all users must trust the KGC. Needing a mutually trusted KGC can cause problem in some applications. For example, users in a social network cannot trust the network server to select a group key for a secure group communication. In this paper, we remove the need of a mutually trusted KGC by assuming that each user only trusts himself. During registration, each user acts as a KGC to register other users and issue sub-shares to other users. From the secret sharing homomorphism, all sub-shares of each user can be combined into a master share. The master share enables a pairwise shared key between any pair of users. A verification of master shares enables all users to verify their master shares are generated consistently without revealing the master shares. In a group communication, the initiator can become the server to select a group key and distribute it to each other user over a pairwise shared channel. Our design is unique since the storage of each user is minimal, the verification of master shares is efficient and the group key distribution is centralized. There are public-key based group key establishment protocols without a trusted third party. However, these protocols can only establish a single group key. Our protocol is a non-public-key solution and can establish multiple group keys which is computationally efficient.  相似文献   
20.
The chemical and physical compatibility of the proton conducting electrolyte material LaNbO4 with the potential partner materials LaMO3 (MMn, Fe, Co) and La2NiO4 is investigated via the reaction of fine-grained powders and solid-state diffusion couples. Results show generally good chemical compatibility for LaNbO4 with perovskite type compositions, particularly the LaFeO3 and LaMnO3 systems. In contrast, Ruddlesden–Popper type phases are predicted to be poor candidates for use with LaNbO4. Investigation of the La2O3–NiO–Nb2O5 and La2O3–CoO–Nb2O5 phase diagrams finds two new perovskite-related materials of stoichiometry LaNb1/3M2/3O3 (MNi, Co), and indicates coexistence of LaNbO4 with the binary oxides NiO and CoO. Additionally, reduction of a LaNbO4–NiO composite confirms coexistence of LaNbO4 with Ni, and so it is concluded that doped-LaMO3|LaNbO4|Ni-LaNbO4 type electrochemical cells may be manufactured via a direct co-firing route without the formation of secondary phases at inter-phase boundaries.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号