全文获取类型
收费全文 | 147篇 |
免费 | 3篇 |
国内免费 | 7篇 |
专业分类
电工技术 | 1篇 |
综合类 | 4篇 |
机械仪表 | 1篇 |
无线电 | 43篇 |
一般工业技术 | 2篇 |
自动化技术 | 106篇 |
出版年
2022年 | 2篇 |
2021年 | 1篇 |
2020年 | 1篇 |
2019年 | 1篇 |
2017年 | 5篇 |
2015年 | 1篇 |
2014年 | 5篇 |
2013年 | 5篇 |
2012年 | 3篇 |
2011年 | 3篇 |
2010年 | 8篇 |
2009年 | 11篇 |
2008年 | 11篇 |
2007年 | 8篇 |
2006年 | 14篇 |
2005年 | 15篇 |
2004年 | 6篇 |
2003年 | 17篇 |
2002年 | 7篇 |
2001年 | 8篇 |
2000年 | 5篇 |
1999年 | 1篇 |
1998年 | 5篇 |
1997年 | 2篇 |
1996年 | 3篇 |
1994年 | 1篇 |
1993年 | 2篇 |
1992年 | 1篇 |
1991年 | 2篇 |
1990年 | 1篇 |
1987年 | 1篇 |
1986年 | 1篇 |
排序方式: 共有157条查询结果,搜索用时 15 毫秒
61.
The fact that there are zero-knowledge proofs for all languages in NP (see [15], [6], and [5]) has, potentially, enormous
implications to cryptography. For cryptographers, the issue is no longer “which languages in NP have zeroknowledge proofs”
but rather “which languages in NP have practical zeroknowledge proofs.” Thus, the concrete complexity of zero-knowledge proofs
for different languages must be established.
In this paper we study the concrete complexity of the known general methods for constructing zero-knowledge proofs. We establish
that circuit-based methods, which can be applied in either the GMR or the BCC model, have the potential of producing proofs
which can be used in practice. Then we introduce several techniques which greatly reduce the concrete complexity of circuit-based
proofs, and we show that these techniques lead to zero-knowledge proofs of knowledge.
Finally, we show how to combine the techniques of Kilian, Micali, and Ostrovsky, for designing zero-knowledge proofs with
only two envelopes, with some of our techniques for reducing the number of bits which the prover must commit to.
Supported in part by NSA Grant No. MDA90488-H-2006.
Supported in part by NSF Grant No. CCR-8909657. 相似文献
62.
张兴 《信息安全与通信保密》1996,(4)
密钥分配是密钥管理诸环节中最关键最要害的环节之一。本文以密钥管理标准ISO 11166、11568等标准为背景,讨论了如何利用密码服务报文来传送密钥的技术问题和实现问题。 相似文献
63.
This paper describes a new specialized Reconfigurable Cryptographic for Block ciphers Architecture(RCBA).Application-specific computation pipelines can be configured according to the characteristics of the block cipher processing in RCBA,which delivers high performance for cryptographic applications.RCBA adopts a coarse-grained reconfigurable architecture that mixes the appropriate amount of static configurations with dynamic configurations.RCBA has been implemented based on Altera’s FPGA,and representative algorithms of block cipher such as DES,Rijndael and RC6 have been mapped on RCBA architecture successfully.System performance has been analyzed,and from the analysis it is demonstrated that the RCBA architecture can achieve more flexibility and efficiency when compared with other implementations. 相似文献
64.
65.
66.
67.
A comparative overview of two well-defined key management schemes using the Data Encryption Standard, the IBM Cryptographic System and the Key Notarization System, is presented with emphasis on the interaction between the host operating system and the host cryptographic operations suggested in the two systems. Therefore, integrating cryptography into computer networks is a topic of current interest. A software scheme to implement the host cryptographic operations defined by the KNS is outlined. 相似文献
68.
根据串空间证明协议安全性的代数结论,可以判断协议是否存在缺陷,但没有给出一个精确的答案:究竟攻击是如何进行的?本文提出四务启发式规则以完成代数缺陷到实际攻击的转换。并结合Needham—Schroeder公钥协议、Otway—Rees对称密钥协议进行了攻击转换分析。实践表明这四条规则在把串空间的代数缺陷转换为实际攻击时非常有效。 相似文献
69.
研究了动态口令技术,分析了文献[1]中的一个远程动态口令认证方案,发现原方案不能抵抗劫取连接攻击.对原方案进行了修改,修改后的方案克服了原方案存在的安全漏洞,保留了原方案的所有安全特性,具有更高的安全性. 相似文献
70.
We present CASRUL, a compiler for cryptographic protocols specifications. Its purpose is to verify the executability of protocols and to translate them into rewrite rules that can be used by several kinds of automatic or semi-automatic tools for finding design flaws. We also present a related complexity results concerning the protocol insecurity problem for a finite number of sessions. We show the problem is in NP without assuming bounds on messages and with non-atomic encryption keys. We also explain that in order to build an attack with a fixed number of sessions the intruder needs only to forge messages of linear size, provided that they are represented as dags.For more information: http://www.loria.fr/equipes/protheo/SOFTWARES/CASRUL/. 相似文献