全文获取类型
收费全文 | 105篇 |
免费 | 36篇 |
国内免费 | 25篇 |
专业分类
电工技术 | 3篇 |
综合类 | 13篇 |
金属工艺 | 1篇 |
机械仪表 | 4篇 |
建筑科学 | 3篇 |
轻工业 | 2篇 |
石油天然气 | 1篇 |
武器工业 | 1篇 |
无线电 | 26篇 |
一般工业技术 | 8篇 |
冶金工业 | 4篇 |
自动化技术 | 100篇 |
出版年
2022年 | 4篇 |
2021年 | 1篇 |
2020年 | 7篇 |
2019年 | 2篇 |
2018年 | 1篇 |
2017年 | 7篇 |
2016年 | 6篇 |
2015年 | 4篇 |
2014年 | 10篇 |
2013年 | 11篇 |
2012年 | 16篇 |
2011年 | 18篇 |
2010年 | 10篇 |
2009年 | 23篇 |
2008年 | 13篇 |
2007年 | 14篇 |
2006年 | 2篇 |
2005年 | 3篇 |
2004年 | 4篇 |
2003年 | 4篇 |
2002年 | 3篇 |
2001年 | 1篇 |
1999年 | 1篇 |
1996年 | 1篇 |
排序方式: 共有166条查询结果,搜索用时 15 毫秒
1.
2.
Certificateless cryptography addresses the private key escrow problem in identity-based systems, while overcoming the costly issues in traditional public key cryptography. Undeniable signature schemes were proposed with the aim of limiting the public verifiability of ordinary digital signatures. The first certificateless undeniable signature scheme was put forth by Duan. The proposed scheme can be considered as the certificateless version of the identity-based undeniable signature scheme which was introduced by Libert and Quisquater. In this paper, we propose a new scheme which is much more efficient comparing to Duan's scheme. Our scheme requires only one pairing evaluation for signature generation and provides more efficient confirmation and disavowal protocols for both the signer and the verifier. We also prove the security of our scheme in the strong security model based on the intractability of some well-known pairing-based assumptions in the random oracle model. 相似文献
3.
Kuo‐Chung Huang Yi‐Heng Chou Lang‐chin Lin Hoang Yan Lin Fu‐Hao Chen Ching‐Chiu Liao Yi‐Han Chen Kuen Lee Wan‐Hsuan Hsu 《Journal of the Society for Information Display》2013,21(6):263-270
The optimal viewing distance was proposed as a parameter for designing a parallax barrier 3D display. It can be designed based on simple geometric method and by considering the pitches of image display pixels and parallax barrier, or even including the aperture ratios of the image display pixels and parallax barrier. It can be analyzed by using ray tracing method. By considering the optical refraction index of the cover glass, the angular behavior of the system becomes more realistic; however, the geometric method is difficult to be used. We propose a revised method for estimating the view distance and angular behavior. In this paper, we have demonstrated a designated eye position (DEP) for each view and shown that multiple DEPs make a circular curve around the center of the display. We prove the new concept by comparing the optical ray tracing calculations and optical measurement. 相似文献
4.
无证书广义指定多个验证者有序多重签名 总被引:2,自引:0,他引:2
有序多重签名方案一般都是基于离散对数或身份的,存在着证书管理问题或是密钥托管问题。广义指定多个验证者签名体制允许签名的持有者指定多个签名的验证者,只有被指定的验证者可以验证签名的有效性。将无证书签名体制和广义指定多个验证者签名体制相结合,提出了无证书广义指定多个验证者有序多重签名方案及其安全模型。在随机预言模型下的安全性分析表明:该方案可以抵抗适应性选择消息攻击,其不可伪造性基于BDH困难假设。 相似文献
5.
Devinder Thapa Chang Mok Park Sang C. Park Gi-Nam Wang 《International Journal of Control, Automation and Systems》2009,7(2):165-174
The objective of this paper is to reduce the development time of a PLC (Programmable Logic Controller) by automating the task
of code generation. For this purpose, we applied t-MPSG (Timed-Message Based Part State Graph). The t-MPSG is an extended finite state automata used to model and generate an execution module for a real-time shop floor controller
system. In our proposed method, t-MPSG is used to model the formal specification of the controller system that can be translated into textual structure. After
the verification of the t-MPSG model, it can be used as an input to the plc-builder tool. The plc-builder tool is an extended version of a conventional MPSG simulator. It can be used to translate the textual structure of
the t-MPSG into an IEC standard PLC code. Finally, the generated code can be downloaded to a PLC emulator or a PLC device for the
purpose of simulation and execution. The similarity in the hierarchical structure of the t-MPSG and the IEC standard PLC program has made it convenient to transform from one form to another. Furthermore, an illustration
of the methodology to auto-generate IEC standard PLC code using t-MPSG is explained with a suitable example.
Recommended by Editorial Board member Young Soo Suh under the direction of Editor Jae Weon Choi. This work was partially supported
by Defense Acquisition Program Administration and Agency for Defense Development under the contract (UD080042AD).
Devinder Thapa is a Postdoc Research Fellow in the Department of Industrial & information systems at Ajou University, Korea. He completed
his Ph.D. from Ajou University in Industrial and Information Systems Engineering. His area of research is related to manufacturing
automation and intelligent decision support systems.
Chang Mok Park is a Professor in the Department of Technology & Systems Management at Induk Institute of Technology. He completed his Ph.D.
in 2002 from Ajou University in Industrial Engineering. His research interest is related to manufacturing optimization, discrete
event system simulation and signal analysis.
Sang C. Park is an Associate Professor in the Department of Industrial & Information Systems Engineering at Ajou University. He received
his B.S., M.S., and Ph.D. degrees from KAIST in 1994, 1996, and 2000, respectively, all in Industrial Engineering. His research
interests include geometric algorithms in CAD/CAM, process planning, engineering knowledge management, and discrete event
system simulation.
Gi-Nam Wang is the Head and a Professor in the Department of Industrial & Information Systems Engineering at Ajou University, Korea.
He completed his Ph.D. in 1992 from Texas A&M University, in Industrial Engineering. He has worked as Visiting Professor at
University of Texas at Austin during 2000–2001. His area of research is related to Intelligent Information & manufacturing
systems, system integration & automation, e-Business solutions and image processing. 相似文献
6.
7.
A strong designated verifier signature scheme makes it possible for a signer to convince a designated verifier that she has signed a message in such a way that the designated verifier cannot transfer the signature to a third party, and no third party can even verify the validity of a designated verifier signature. We show that anyone who intercepts one signature can verify subsequent signatures in Zhang-Mao ID-based designated verifier signature scheme and Lal-Verma ID-based designated verifier proxy signature scheme. We propose a new and efficient ID-based designated verifier signature scheme that is strong and unforgeable. As a direct corollary, we also get a new efficient ID-based designated verifier proxy signature scheme. 相似文献
8.
A method is presented for checking secure information flow in Java bytecode, assuming a multilevel security policy that assigns security levels to the objects. The method exploits the type‐level abstract interpretation of standard bytecode verification to detect illegal information flows. We define an algorithm transforming the original code into another code in such a way that a typing error detected by the Verifier on the transformed code corresponds to a possible illicit information flow in the original code. We present a prototype tool that implements the method and we show an example of application. Copyright © 2004 John Wiley & Sons, Ltd. 相似文献
9.
利用双线性对构造的数字签名具有安全性高、密钥长度短和实现快速等优点,为此通过双线性对构造一个指定验证者签名方案,给出其在招投标中的应用流程,通过理论分析证明该方案具有正确性、不可伪造性、不可否认性、不可传递性及签名源的隐匿性,并能防止招标公司为获得最低报价而采取的作弊行为。 相似文献
10.
张学军 《计算机工程与应用》2008,44(13):33-35
在一个指定验证者签名方案中,只有指定的验证者才能验证签名的有效性。论文基于双线性对提出一种新的基于身份的广义指定多个验证者签名方案。新方案采用引进两个独立PKG的方法,在一定程度上消除了单个PKG可以伪造用户签名的安全缺陷。证明了在BDH问题假设和随机预言机下新方案是安全的。 相似文献