全文获取类型
收费全文 | 4073篇 |
免费 | 967篇 |
国内免费 | 744篇 |
专业分类
电工技术 | 125篇 |
综合类 | 502篇 |
化学工业 | 201篇 |
金属工艺 | 71篇 |
机械仪表 | 40篇 |
建筑科学 | 171篇 |
矿业工程 | 30篇 |
能源动力 | 38篇 |
轻工业 | 9篇 |
水利工程 | 29篇 |
石油天然气 | 12篇 |
武器工业 | 210篇 |
无线电 | 1098篇 |
一般工业技术 | 190篇 |
冶金工业 | 29篇 |
原子能技术 | 12篇 |
自动化技术 | 3017篇 |
出版年
2024年 | 37篇 |
2023年 | 121篇 |
2022年 | 199篇 |
2021年 | 217篇 |
2020年 | 206篇 |
2019年 | 171篇 |
2018年 | 165篇 |
2017年 | 202篇 |
2016年 | 172篇 |
2015年 | 229篇 |
2014年 | 356篇 |
2013年 | 339篇 |
2012年 | 402篇 |
2011年 | 463篇 |
2010年 | 374篇 |
2009年 | 335篇 |
2008年 | 366篇 |
2007年 | 365篇 |
2006年 | 277篇 |
2005年 | 233篇 |
2004年 | 145篇 |
2003年 | 129篇 |
2002年 | 68篇 |
2001年 | 55篇 |
2000年 | 46篇 |
1999年 | 28篇 |
1998年 | 13篇 |
1997年 | 13篇 |
1996年 | 12篇 |
1995年 | 10篇 |
1994年 | 5篇 |
1993年 | 7篇 |
1992年 | 3篇 |
1991年 | 4篇 |
1990年 | 4篇 |
1989年 | 2篇 |
1988年 | 4篇 |
1985年 | 1篇 |
1981年 | 1篇 |
1980年 | 1篇 |
1979年 | 1篇 |
1978年 | 1篇 |
1977年 | 2篇 |
排序方式: 共有5784条查询结果,搜索用时 15 毫秒
31.
David F. Barrero Julio César Hernández‐Castro Pedro Peris‐Lopez David Camacho María D. R‐Moreno 《Expert Systems》2014,31(1):9-19
Radio frequency identification (RFID) is a powerful technology that enables wireless information storage and control in an economical way. These properties have generated a wide range of applications in different areas. Due to economic and technological constrains, RFID devices are seriously limited, having small or even tiny computational capabilities. This issue is particularly challenging from the security point of view. Security protocols in RFID environments have to deal with strong computational limitations, and classical protocols cannot be used in this context. There have been several attempts to overcome these limitations in the form of new lightweight security protocols designed to be used in very constrained (sometimes called ultra‐lightweight) RFID environments. One of these proposals is the David–Prasad ultra‐lightweight authentication protocol. This protocol was successfully attacked using a cryptanalysis technique named Tango attack. The capacity of the attack depends on a set of boolean approximations. In this paper, we present an enhanced version of the Tango attack, named Genetic Tango attack, that uses Genetic Programming to design those approximations, easing the generation of automatic cryptanalysis and improving its power compared to a manually designed attack. Experimental results are given to illustrate the effectiveness of this new attack. 相似文献
32.
X-ray microtomography (microCT) of the progression of sulfate attack of cement paste 总被引:2,自引:0,他引:2
High-resolution X-ray computed tomography (i.e., microCT or microtomography) was used to study the sulfate attack of cylinders of Type I cement paste cast with water-cement (w/c) ratios of 0.45, 0.50 and 0.60. Damage levels in samples exposed to a Na2SO4 solution with 10,000 ppm sulfate ion concentration were qualitatively rated from 0 (no damage) to 4 (extreme damage) based upon visual examination of the samples' exteriors and microtomography of the samples' interiors. The greater the w/c ratio, the more rapid the onset of sulfate damage. The corners of the cylinders appeared to be particularly susceptible to spalling, and damage may have continued into the cement paste by formation of subsurface cracks. 相似文献
33.
34.
35.
对新近提出的两个高效无证书签名方案进行安全性分析,指出这两个签名方案都能受到替换公钥攻击。任意攻击者都可以通过替换签名人的公钥从而达到对任意选择的消息成功伪造签名,分析这两个签名方案能受到替换公钥攻击的根本原因。最后通过这两个攻击总结分析了无证书签名方案设计过程需要注意的要点,这对无证书签名方案的设计具有借鉴意义。 相似文献
36.
Jean-Marc Tulliani Laura MontanaroAlfredo Negro Mario Collepardi 《Cement and Concrete Research》2002,32(6):843-849
A case history of a severe degradation of concrete foundation plinths and piers of an about-35-year-old building located in Northern Italy is described. Significant amounts of gypsum, near ettringite and/or thaumasite were detected by X-ray diffraction analyses performed on ground concrete samples. Large gypsum crystals were mainly located at the interface between the cement paste and aggregates, as observed by scanning electron microscopy coupled to energy-dispersive spectroscopy microanalysis. The degradation effects increased with decreasing the distance of concrete structures from an absorbing well located in the courtyard of the building. The well was recognized as the sulfate source due to the microorganism metabolism of sulfur compounds present in the sewage. Consequences of this attack were a very poor bond strength between cement paste and aggregates and a severe cracking of the concrete cover of the steel reinforcement. 相似文献
37.
Recently, physical layer security commonly known as Radio Frequency (RF) fingerprinting has been proposed to provide an additional layer of security for wireless devices. A unique RF fingerprint can be used to establish the identity of a specific wireless device in order to prevent masquerading/impersonation attacks. In the literature, the performance of RF fingerprinting techniques is typically assessed using high-end (expensive) receiver hardware. However, in most practical situations receivers will not be high-end and will suffer from device specific impairments which affect the RF fingerprinting process. This paper evaluates the accuracy of RF fingerprinting employing low-end receivers. The vulnerability to an impersonation attack is assessed for a modulation-based RF fingerprinting system employing low-end commodity hardware (by legitimate and malicious users alike). Our results suggest that receiver impairment effectively decreases the success rate of impersonation attack on RF fingerprinting. In addition, the success rate of impersonation attack is receiver dependent. 相似文献
38.
39.
40.
随着安全芯片应用范围的不断扩大和应用环境的日趋复杂,需要通过穿透性测试验证芯片的安全性,同时有必要对测试进行评估。为此,提出一种基于攻击树模型的安全芯片穿透性测试评估方法。分析安全芯片的穿透性测试过程,采用攻击树模型作为穿透性测试的描述模型,在此基础上提出攻击事件的多属性赋值方法、攻击代价的推算方法和攻击路径的分析方法。应用结果表明,该方法可准确评估安全芯片穿透性测试结果。 相似文献