全文获取类型
收费全文 | 1962篇 |
免费 | 244篇 |
国内免费 | 181篇 |
专业分类
电工技术 | 26篇 |
综合类 | 233篇 |
机械仪表 | 12篇 |
建筑科学 | 2篇 |
矿业工程 | 3篇 |
能源动力 | 1篇 |
轻工业 | 5篇 |
石油天然气 | 1篇 |
武器工业 | 3篇 |
无线电 | 708篇 |
一般工业技术 | 56篇 |
冶金工业 | 6篇 |
自动化技术 | 1331篇 |
出版年
2025年 | 10篇 |
2024年 | 53篇 |
2023年 | 39篇 |
2022年 | 54篇 |
2021年 | 51篇 |
2020年 | 75篇 |
2019年 | 52篇 |
2018年 | 58篇 |
2017年 | 55篇 |
2016年 | 78篇 |
2015年 | 76篇 |
2014年 | 101篇 |
2013年 | 150篇 |
2012年 | 168篇 |
2011年 | 179篇 |
2010年 | 129篇 |
2009年 | 155篇 |
2008年 | 126篇 |
2007年 | 167篇 |
2006年 | 138篇 |
2005年 | 94篇 |
2004年 | 84篇 |
2003年 | 65篇 |
2002年 | 48篇 |
2001年 | 34篇 |
2000年 | 33篇 |
1999年 | 31篇 |
1998年 | 8篇 |
1997年 | 14篇 |
1996年 | 7篇 |
1995年 | 8篇 |
1994年 | 5篇 |
1993年 | 5篇 |
1992年 | 8篇 |
1991年 | 4篇 |
1990年 | 5篇 |
1989年 | 4篇 |
1988年 | 3篇 |
1985年 | 2篇 |
1984年 | 2篇 |
1982年 | 6篇 |
1980年 | 1篇 |
1979年 | 1篇 |
1977年 | 1篇 |
排序方式: 共有2387条查询结果,搜索用时 15 毫秒
21.
本文分析了数字签名的优势和潜力,指出了数字签名技术的广阔应用前景,同时阐明了建立相关标准的重要性,并且提出了一个数字签名技术应用的通用的模型. 相似文献
22.
杨义先 《北京邮电大学学报》1989,(4)
本文利用高维矩阵给出一类新型的公钥分配方案,并将它推广到会议情形;接着在此公钥分配方案的基础上给出了另一类自确认密码体系. 相似文献
23.
In order to provide an opportunity to make personal communication as broad as possible, mobile satellite communication systems have recently drawn much attention. However, any communication system raises two major challenging issues: (1) how to determine whether actors are whom they claim to be; and (2) how to protect data against unauthorized disclosure. Although the secret-key cryptosystem (SKC) and the public-key cryptosystem (PKC) have been developed to provide well-defined security services to address these issues each has serous drawbacks while SKC-based authentication schemes have the common demerit that the server which maintains the secret-key table becomes an attractive target for numerous intrusions, PKC-based schemes suffer from the expensive complexity of the public-key infrastructure (PKI) and a high computation overhead. Therefore, in this paper, a self-verification authentication mechanism with lower computation and key management cost is introduced. 相似文献
24.
可视加密的基本思想是把密文信息分解成为多个部分,这些部分被称为可视密码的共享信息。自从可视加密算法出现,就被运用到各种领域,从而使可视加密的方法得到完善。给出一种基于网点位置的二进制相位调制(2PSK)和光栅的光学特性相结合的信息植入方法,来实现可视加密。其利用一个和载体图像相同频率的光栅片叠加产生莫尔条纹,该方法能够通过莫尔现象的性质和印刷加网技术的特性来实现信息的解码。由于利用可视加密的信息隐藏和显现,可减少对设备的依赖性并降低防伪成本。在图书版权保护方面,采用这种方法能有效的解决盗版侵权问题,同时也给图书提供了增值性服务,获得相应的图书增值效果。 相似文献
25.
Cloud computing provides universal access to a pool of shared resources to numerous stakeholders/shareholders of the e‐healthcare industry. The speedy adoption of cloud computing has inevitably raised security concerns for the outsourced data. Since mobile devices are resource constrained, the security solutions must discharge the computing comprehensive operations on the cloud for implementation. Conventionally, any modification to uploaded record would compel the mobile client to encrypt and compute the hash value from scratch. Through this paper, we intend to propose a pairing‐free incremental proxy re‐encryption scheme, without certificates, which would run proportionate to the number of modifications in time, instead of the document length for improvement in the file modification tasks. The proposed scheme shows a significant improvement in the file modification system regarding the energy consumption and the turnaround timer taken. The proposed scheme has been verified through a formal method using Z3 solver. 相似文献
26.
28.
介绍了椭圆曲线密码体制(ECC)和TSL协议的主要子协议Handshake的工作过程,提出了在TLS协议中应用椭圆曲线密码体制的签名、认证、数字信封的实现方案,该认证方案不依赖可信第三方,防止了骗取消息的可能。 相似文献
29.
This paper shows a secured key-based (k, n) threshold cryptography scheme, where key as well as secret data is shared among set of participants. In this scheme, each share has some bytes missing and these missing bytes can be recovered from a set of exactly k shares, but not less than k. Therefore, each share contains partial secret information which is also encrypted by DNA encoding scheme. Additionally, this paper introduces a concept, where each share information size is varied. More precisely, each share contains a different percentage of secret information and which is strongly dependent on the key. Moreover key sensitivity analysis and statistical analysis prove the robustness against different cryptanalysis attacks and thus ensures high acceptability for information security requirements. 相似文献
30.
To send a message with both confidentiality and au-thenticity is a main goal that computer and telecommuni-cation researches pursue.In1998,Y.Zheng[1]proposeda new primitive signcryption,which encrypt as well assign a message in a logic step.Butthe costis lower thanthe conventional‘sign-then-encrypt’approach.Sincesigncryption has better efficiency,it is studied widely.However,there is a weakness in Y.Zheng’s scheme,which can’t provide public verifiability.When a signerdenies her signature… 相似文献