全文获取类型
收费全文 | 11019篇 |
免费 | 1430篇 |
国内免费 | 1073篇 |
专业分类
电工技术 | 530篇 |
技术理论 | 3篇 |
综合类 | 1169篇 |
化学工业 | 283篇 |
金属工艺 | 170篇 |
机械仪表 | 408篇 |
建筑科学 | 2096篇 |
矿业工程 | 474篇 |
能源动力 | 282篇 |
轻工业 | 467篇 |
水利工程 | 334篇 |
石油天然气 | 206篇 |
武器工业 | 74篇 |
无线电 | 1920篇 |
一般工业技术 | 407篇 |
冶金工业 | 362篇 |
原子能技术 | 49篇 |
自动化技术 | 4288篇 |
出版年
2024年 | 41篇 |
2023年 | 163篇 |
2022年 | 309篇 |
2021年 | 326篇 |
2020年 | 416篇 |
2019年 | 264篇 |
2018年 | 244篇 |
2017年 | 279篇 |
2016年 | 370篇 |
2015年 | 461篇 |
2014年 | 881篇 |
2013年 | 780篇 |
2012年 | 958篇 |
2011年 | 988篇 |
2010年 | 853篇 |
2009年 | 810篇 |
2008年 | 792篇 |
2007年 | 909篇 |
2006年 | 764篇 |
2005年 | 643篇 |
2004年 | 528篇 |
2003年 | 365篇 |
2002年 | 326篇 |
2001年 | 229篇 |
2000年 | 192篇 |
1999年 | 153篇 |
1998年 | 104篇 |
1997年 | 81篇 |
1996年 | 53篇 |
1995年 | 45篇 |
1994年 | 20篇 |
1993年 | 31篇 |
1992年 | 18篇 |
1991年 | 12篇 |
1990年 | 18篇 |
1989年 | 20篇 |
1988年 | 10篇 |
1987年 | 5篇 |
1986年 | 8篇 |
1985年 | 10篇 |
1984年 | 7篇 |
1983年 | 5篇 |
1982年 | 6篇 |
1981年 | 3篇 |
1980年 | 8篇 |
1979年 | 4篇 |
1964年 | 2篇 |
1958年 | 1篇 |
1956年 | 2篇 |
1954年 | 1篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
111.
Hajime Nagahama 《AI & Society》1998,12(4):251-263
Japan's educational system has some major problems. The most important among these concerns is the basic concept of the educational process and the goal of education. The old concept of public educational systems has become outdated in today's Japanese society, although this concept had supported social and spiritual faith, economic success and selfless devotion to one's country for more than 100 years. Now, Japanese people need a new concept of the educational process and the goal of education for the twenty-first century. The paper proposes a value chain of educational and learning systems aimed at building a network consisting of multiple fields for fostering future human resources. 相似文献
112.
这里提出了一种基于椭圆曲线公钥密码算法的序列号生成方案,结合签名技术,可以防止敌手代码被篡改或者跳过某些重要代码,因此该方案构成一种安全有效的软件保护方案,最后分析了该方案的安全性,并进行了方案的有效性实验. 相似文献
113.
114.
115.
116.
密钥管理技术是基本的安全技术之一,在无线网络中扮演重要的角色。无线网络中密钥管理技术的研究是近年来的热点。本文概述了无线网络中密钥管理技术,即无线传感器网络和无线自组网络中的密钥管理技术。 相似文献
117.
As a practical extension of our previous work on certificateless threshold cryptosystem, this paper proposes the first direct certificateless threshold key encapsulation mechanism that inherits the same trust level of the original scheme and removes the length limitation of a traditional public key encryption. Security against threshold chosen-ciphertext attacks are proved in a random oracle model under a new assumption. It tolerates the Type I adversary that can replace public keys and the Type II adversary that has access to the system’s master key. The implied encapsulation scheme is very efficient when compared to the most efficient schemes in a traditional public key cryptosystem, and it is slightly more efficient in terms of key length and encapsulation speed when compared to the identity-based cryptosystems that have the same ciphertext overhead. Finally, we describe several potential modifications of our scheme. 相似文献
118.
Based on the computational Diffie-Hellman problem, this paper proposes an identity-based authenticated key agreement protocol which removes bilinear pairings. Compared with previous protocols, the new protocol minimizes message exchange time with no extra cost. The protocol provides strong security guarantees including key compromise impersonation resilience, perfect forward secrecy, and master key forward secrecy. A security proof with the modular approach in the modified Bellare-Rogaway model is also provided. 相似文献
119.
针对无线传感器网络节点计算和存储能力有限,能量受限等特点,提出了一种新的分簇传感器网络密钥预分配管理方案KDNKPD。该方案借助于Blundo二元多项式函数和密钥分发节点建立节点与簇头间的安全通信,能够适应簇首节点的按轮选举并解决了Blundo方案的安全问题。通过安全分析与性能分析比较和仿真实验表明,该方案提高了网络的安全性,减少了传感器节点的存储开销和计算开销。 相似文献
120.
Dual-key-binding cancelable palmprint cryptosystem for palmprint protection and information security
Biometric cryptosystems and cancelable biometrics are both practical and promising schemes to enhance the security and privacy of biometric systems. Though a number of bio-crypto algorithms have been proposed, they have limited practical applicability because they lack of cancelability. Since biometrics are immutable, the users whose biometrics are stolen cannot use bio-crypto systems anymore. Cancelable biometric schemes are of cancelability; however, they are difficult to compromise the conflicts between the security and performance. By embedded a novel cancelable palmprint template, namely “two dimensional (2D) Palmprint Phasor”, the proposed palmprint cryptosystem overcomes the lack of cancelability in existing biometric cryptosystems. Besides, the authentication performance is enhanced when users have different tokens/keys. Furthermore, we develop a novel dual-key-binding cancelable palmprint cryptosystem to enhance the security and privacy of palmprint biometric. 2D Palmprint Phasor template is scrambled by the scrambling transformation based on the chaotic sequence that is generated by both the user's token/key and strong key extracted from palmprint. Dual-key-binding scrambling not only has more robustness to resist against chosen plain text attack, but also enhances the secure requirement of non-invertibility. 2D Palmprint Phasor algorithm and dual-key-binding scrambling both increase the difficulty of adversary's statistical analysis. The experimental results and security analysis confirm the efficiency of the proposed scheme. 相似文献