首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1180篇
  免费   228篇
  国内免费   151篇
电工技术   15篇
综合类   155篇
化学工业   1篇
金属工艺   3篇
机械仪表   9篇
建筑科学   1篇
能源动力   2篇
轻工业   3篇
水利工程   1篇
石油天然气   1篇
武器工业   1篇
无线电   404篇
一般工业技术   28篇
自动化技术   935篇
  2024年   2篇
  2023年   14篇
  2022年   17篇
  2021年   36篇
  2020年   32篇
  2019年   24篇
  2018年   28篇
  2017年   39篇
  2016年   36篇
  2015年   51篇
  2014年   82篇
  2013年   122篇
  2012年   127篇
  2011年   88篇
  2010年   80篇
  2009年   93篇
  2008年   97篇
  2007年   120篇
  2006年   108篇
  2005年   66篇
  2004年   47篇
  2003年   64篇
  2002年   36篇
  2001年   29篇
  2000年   21篇
  1999年   11篇
  1998年   9篇
  1997年   18篇
  1996年   13篇
  1995年   11篇
  1994年   8篇
  1993年   8篇
  1992年   7篇
  1990年   7篇
  1989年   4篇
  1988年   1篇
  1985年   1篇
  1982年   1篇
  1980年   1篇
排序方式: 共有1559条查询结果,搜索用时 328 毫秒
31.
用SIP协议构建视频会议系统已成为一个趋势,但在设计和实现过程中也存在一些缺陷和问题,如无成熟标准、安全性差。为解决这些问题,提出一个基于SIP的多方视频会议系统模型。该模型采用分层设计思想,利用成熟的网络协议和加密技术,保障了系统的实用性和安全性,是一个可扩展到广域网的适应性很强的多方视频会议解决方案。通过系统设计和实现验证了该方案的可行性和实用性。  相似文献   
32.
When it comes to data storage, cloud computing and cloud storage providers play a critical role. The cloud data can be accessed from any location with an internet connection. Additionally, the risk of losing privacy when data is stored in a cloud environment is also increased. A variety of security techniques are employed in the cloud to enhance security. In this paper, we aim at maintaining the privacy of stored data in cloud environment by implementing block-based modelling to boost the privacy level with Anti-Codify Technique (ACoT) and block cipher-based algorithms. Initially, the cipher text is generated using Deoxyribo Nucleic Acid (DNA) model. Block-cipher-based encryption is used by ACoT, but the original encrypted file and its extension are broken up into separate blocks. When the original file is broken up into two separate blocks, it raises the security level and makes it more difficult for outsiders to cloud data access. ACoT improves the security and privacy of cloud storage data. Finally, the fuzzy-based classification is used that stores various access types in servers. The simulation results shows that the ACoT-DNA method achieves higher entropy against various block size with reduced computational cost than existing methods.  相似文献   
33.
IoT devices have been widely used with the advent of 5G. These devices contain a large amount of private data during transmission. It is primely important for ensuring their security. Therefore, we proposed a lightweight block cipher based on dynamic S-box named DBST. It is introduced for devices with limited hardware resources and high throughput requirements. DBST is a 128-bit block cipher supporting 64-bit key, which is based on a new generalized Feistel variant structure. It retains the consistency and significantly boosts the diffusion of the traditional Feistel structure. The SubColumns of round function is implemented by combining bit-slice technology with subkeys. The S-box is dynamically associated with the key. It has been demonstrated that DBST has a good avalanche effect, low hardware area, and high throughput. Our S-box has been proven to have fewer differential features than RECTANGLE S-box. The security analysis of DBST reveals that it can against impossible differential attack, differential attack, linear attack, and other types of attacks.  相似文献   
34.
In the current circumstance, e-commerce through an online banking system plays a significant role. Customers may either buy goods from E-Commerce websites or use online banking to move money to other accounts. When a user participates in these types of behaviors, their sensitive information is sent to an untrustworthy network. As a consequence, when transmitting data from an internal browser to an external E-commerce web server using the cryptographic protocol SSL/TLS, the E-commerce web server ensures the security of the user’s data. The user should be pleased with the confidentiality, authentication, and authenticity properties of the SSL/TLS on both the user’s web browser and the remote E-commerce web server. E-Commerce web servers should choose the best SSL/TLS cipher suites for negotiating the user in order to attain such optimistic scenarios, as the cipher suite used in SSL/TLS plays an important role in securing E-Commerce web servers. The paper primarily focuses on analyzing the SSL/TLS cipher and elliptic curves. The paper also recommends the best elliptic curve cipher suites for E-Commerce and online banking servers, based on their power consumption, handshake execution time, and key exchange and signature verification time.  相似文献   
35.
在现代通信中,消息鉴别码广泛应用于数据的完整性保护和起源认证.文中提出一个基于分组密码的消息鉴别码算法CBCR,它在认证任意长度的消息时都具备可证明安全的保障.CBCR在密码分组链接模式的末端采用循环移位操作,并且对所有消息都加入一个定长的前缀,后者使得它在现实应用中具备一定的灵活性.比如说,这些定长的前缀可以是一些安...  相似文献   
36.
分组密码中P-置换的分支数研究   总被引:1,自引:0,他引:1  
P-置换是分组密码轮函数的重要组成部分,好的P-置换能使得轮函数具有更强的抵抗线性和差分攻击能力,长期以来人们利用MDS码设计出了密码性质优良的P-置换,然而在有些情况下,P-置换本的密码学性质只要不低于一个指定的界限,就能方便地应用,因此本文决定利用BCH码和Goppa码来设计密码学指标不低于指定值的P-置换,同时设计了相应算法.因为MDS码的生成矩阵与分支数最大的P-置换之间有一一对应关系,本文利用范德蒙矩阵和柯西矩阵的特性生成了两类分支数达到最大P-置换,最后本文指出利用范德蒙矩阵设计的P-置换是利用Goppa码来设计P-置换的特例.  相似文献   
37.
杜育松  刘美成 《计算机工程》2010,36(13):131-133
构造一个具有最大代数免疫度的奇数元布尔函数等价于在某一已知矩阵中寻找一个可逆子矩阵。如何在这一矩阵中有效地寻找可逆子矩阵仍然是一个难题。针对上述问题研究矩阵的性质,简化矩阵的刻画方式,给出构造最大代数免疫度的奇数元布尔函数的构造方法。构造时只需对低维数的向量进行操作,避免了子矩阵可逆性的判断,能够有效地构造具有最大代数免疫度的奇数元布尔函数。  相似文献   
38.
研究CLEFIA分组密码对多字节差分故障分析的安全性,给出CLEFIA分组密码算法及故障分析原理。根据在第r轮、r-1轮、 r-2轮注入多字节故障的3种条件,提出一种新的针对CLEFIA的多字节故障模型及分析方法。通过仿真实验进行验证,结果表明,由于其Feistel结构和S盒特性,CLEFIA易遭受多字节故障攻击,6~8个错误密文可恢复128 bit的CLEFIA密钥。  相似文献   
39.
根据分组密码操作方式的特点,提出一种面向分组密码处理的NCL电路模型。采用双异步流水线并行工作方式、线性握手和非线性握手混合的握手方式以及基于NCL闭环流水线的控制方式,将AES算法在该模型上进行映射,使用异步电路综合工具Balsa在1 µm工艺下进行综合和仿真,结果证明该模型有效。  相似文献   
40.
Recent advances in algorithms for the multidimensional multiple choice knapsack problems have enabled us to solve rather large problem instances. However, these algorithms are evaluated with very limited benchmark instances. In this study, we propose new methods to systematically generate comprehensive benchmark instances. Some instances with special correlation properties between parameters are found to be several orders of magnitude harder than those currently used for benchmarking the algorithms. Experiments on an existing exact algorithm and two generic solvers show that instances whose weights are uncorrelated with the profits are easier compared with weakly or strongly correlated cases. Instances with classes containing similar set of profits for items and with weights strongly correlated to the profits are the hardest among all instance groups investigated. These hard instances deserve further study and understanding their properties may shed light to better algorithms.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号