全文获取类型
收费全文 | 3214篇 |
免费 | 718篇 |
国内免费 | 564篇 |
专业分类
电工技术 | 69篇 |
综合类 | 451篇 |
化学工业 | 60篇 |
金属工艺 | 18篇 |
机械仪表 | 55篇 |
建筑科学 | 24篇 |
矿业工程 | 14篇 |
能源动力 | 8篇 |
轻工业 | 27篇 |
水利工程 | 4篇 |
石油天然气 | 22篇 |
武器工业 | 28篇 |
无线电 | 880篇 |
一般工业技术 | 59篇 |
冶金工业 | 6篇 |
原子能技术 | 4篇 |
自动化技术 | 2767篇 |
出版年
2024年 | 15篇 |
2023年 | 47篇 |
2022年 | 86篇 |
2021年 | 67篇 |
2020年 | 77篇 |
2019年 | 49篇 |
2018年 | 45篇 |
2017年 | 69篇 |
2016年 | 93篇 |
2015年 | 103篇 |
2014年 | 172篇 |
2013年 | 198篇 |
2012年 | 303篇 |
2011年 | 340篇 |
2010年 | 279篇 |
2009年 | 333篇 |
2008年 | 368篇 |
2007年 | 440篇 |
2006年 | 335篇 |
2005年 | 267篇 |
2004年 | 186篇 |
2003年 | 153篇 |
2002年 | 111篇 |
2001年 | 103篇 |
2000年 | 77篇 |
1999年 | 45篇 |
1998年 | 40篇 |
1997年 | 21篇 |
1996年 | 20篇 |
1995年 | 16篇 |
1994年 | 10篇 |
1993年 | 7篇 |
1992年 | 4篇 |
1991年 | 5篇 |
1990年 | 1篇 |
1989年 | 1篇 |
1988年 | 2篇 |
1987年 | 1篇 |
1986年 | 1篇 |
1985年 | 2篇 |
1983年 | 3篇 |
1982年 | 1篇 |
排序方式: 共有4496条查询结果,搜索用时 12 毫秒
101.
The decentralized cryptocurrency which was based on block chain has been thought the most successful one in history.In the system,public keys were used as the users’ accounts which guaranteed the anonymity in real transactions.However,all the transaction information was recorded in the block chain,it was a potential threat for users’ privacy which might leak the payment information.Moreover,to avoid double-spending,it was agreed that the transaction on the target block was valid only if another k blocks were generated after the target one.The long waiting time reduced the efficiency of the payment system.A model of payment system based on a proxy-cryptocurrency was proposed,and a solution based on blind signature techniques was proposed.The scheme introduced a proxy in the payment phase,by which transaction confirmation time could be reduced and the transaction efficiency could be improved.Meanwhile,the system implements better anonymity,namely as the privacy protection function. 相似文献
102.
刘增进 《信息安全与通信保密》2011,(1):50-54
随着信息化不断发展,PDM系统已经成为国防军工企业战略发展的重要组成部分。在PDM系统建设逐步成熟的背景下,PDM的安全性(身份鉴别与数据安全)也成为摆在国防军工企业面前的一大难题。为解决PDM系统安全性问题,这里以国际通用先进的信息安全技术为参考,以国内信息安全标准为依据,结合PDM系统业务应用的现状,提出了采用PKI公钥基础设施为PDM系统提供安全支撑的技术思路。从而利用PKI完善灵活的接口和标准的安全中间件,使得PDM和新建应用系统可以方便地纳入基于PKI的安全信息服务体系。 相似文献
103.
随着邮政金融网络化进程的推进,邮政金融系统的安全风险也越来越高,因此如何实现网络信息安全成为保证邮政金融系统正常运行至关重要的因素.文中介绍了实现网络信息安全的有关技术及实现方法,如数据加密、数字签名、防火墙等.通过应用这些安全防范技术,提出相应的网络信息安全方案,使邮政金融信息能够安全地在网络中进行通信.合理的网络安全方案和完善的管理体制是邮政金融网络系统安全运行的必要条件. 相似文献
104.
Since Multivatriate Quadratic (MQ)-based Public Key Cryptosystem (MPKC) has been one of the hot research fields of post-quantum cryptography, it becomes important to analyze the security of new MPKC schemes. Wang et al. proposed a novel multivariate signature scheme with Hash-based Tame Transformation and Minus (HTTM) in 2011. For this extended MQ-based signature, we can transform it into an SFLASH variant by splitting and merging HT transformation, and solve an equivalent private key corresponding to the public key of HTTM. Thus, the adversary can forge legitimate signature for any message by using this equivalent private key. 相似文献
105.
文章针对代理签名没有解决的代理撤销问题,基于门限思想,提出一种新的门限代理签名方案。该方案不需要可信中心的支持,仅在参与签名成员的合作下,就可以完成对代理签名人的资格审查,可快速撤销签名人的代理权利,并帮助代理签名人生成合法的签名。 相似文献
106.
In built-in self-test for logic circuits, test data reduction can be achieved using a linear feedback shift register. The probability that this data reduction will allow a faulty circuit to be declared good is the probability of aliasing. Based on the independent bit-error model, we show that the code spectra for the cyclic code generated by the feedback polynomial can be used to obtain an exact expression for the aliasing probability of a multiple input signature register when the test length is a multiple of the cycle length. Several cases are examined and, as expected, primitive feedback polynomials provide the best performance. Some suggestions to avoid peaks in the aliasing probability are given. 相似文献
107.
108.
109.
110.
John P. Robinson 《Journal of Electronic Testing》1992,3(1):9-16
Test data reduction for digital systems is often accomplished through the use of a feedback shift register. This method, known as signature analysis, can exhibit error masking or aliasing. Recent analysis has shown that the use of a primitive polynomial for the register feedback can reduce the probability of aliasing. In this work we demonstrate that not all primitive polynomials are created equal. Some primitive polynomials can have very large transients in their aliasing probability. For example, 1 +X
13 +X
33 can exhibit an aliasing probability more than a million times larger than its asymptotic value of 2–33. An evaluation procedure is presented which can identify polynomials with good transient characteristics. Some recommended feedback polynomials are given. 相似文献