全文获取类型
收费全文 | 101篇 |
免费 | 15篇 |
国内免费 | 7篇 |
专业分类
电工技术 | 1篇 |
综合类 | 23篇 |
武器工业 | 1篇 |
无线电 | 23篇 |
一般工业技术 | 3篇 |
自动化技术 | 72篇 |
出版年
2021年 | 1篇 |
2019年 | 1篇 |
2018年 | 2篇 |
2017年 | 1篇 |
2016年 | 2篇 |
2014年 | 2篇 |
2013年 | 20篇 |
2012年 | 4篇 |
2011年 | 11篇 |
2010年 | 8篇 |
2009年 | 6篇 |
2008年 | 13篇 |
2007年 | 6篇 |
2006年 | 9篇 |
2005年 | 3篇 |
2004年 | 1篇 |
2003年 | 8篇 |
2002年 | 3篇 |
2000年 | 2篇 |
1999年 | 1篇 |
1998年 | 2篇 |
1997年 | 2篇 |
1996年 | 2篇 |
1995年 | 2篇 |
1993年 | 2篇 |
1992年 | 1篇 |
1991年 | 2篇 |
1989年 | 2篇 |
1984年 | 1篇 |
1983年 | 1篇 |
1982年 | 2篇 |
排序方式: 共有123条查询结果,搜索用时 46 毫秒
11.
12.
基于Damgard等人的密钥回收算法,提出了一种更有效的新型量子加密算法。使用通用的哈希函数来检测窃听,如果没有监测到窃听,加解密双方共享的密钥可以被安全地重复使用,否则需要抛弃并重新协商与明文等长的密钥串。在加密经典明文的同时,也为剩余未加密的明文协商密钥。当协商好的密钥量与剩余的明文相同时,就可以使用一次一密来加密从而避免反馈是否存在窃听以及重新协商密钥的过程,显著提高了加密效率。 相似文献
13.
Klaus Schmeh 《Cryptologia》2013,37(1):14-45
Abstract “The Pathology of Cryptology” is the title of a chapter in David Kahn's book The Codebreakers. This chapter mainly deals with hidden messages, which amateur scientists claim to have discovered in the works of William Shakespeare and in other literary works. The present article picks up this subject and provides it with a theoretic framework under the name of “para-steganography.” Moreover, further case studies are added to those given by Kahn, including many examples that only became known after the publication of The Codebreakers. These considerations show that a hidden code can be found almost anywhere, provided that one looks for it in a suitable manner. 相似文献
14.
《Information Security Journal: A Global Perspective》2013,22(4-5):245-249
ABSTRACT Laih and Kuo developed two highly secure and efficient signature schemes based on factoring and discrete logarithms. Unfortunately, their schemes require many keys for signing document and verifying signature. Li, Tzeng, and Hwang improved one of their schemes and managed to reduce the number of keys, but unfortunately the improved scheme was shown to be insecure by Qian, Chao, and Bao. In this paper, a new modified scheme of Li-Tzeng-Hwang is presented with two main results: The modified scheme requires fewer keys than the scheme by Laih and Kuo, and it is able to withstand many attacks including the one mentioned by Qian, Chao and Bao. 相似文献
15.
杨义先 《北京邮电大学学报》1989,(4)
本文利用高维矩阵给出一类新型的公钥分配方案,并将它推广到会议情形;接着在此公钥分配方案的基础上给出了另一类自确认密码体系. 相似文献
16.
本文在Eisenstein环Z[ω]上得到了两类新的密码体制。它们分别是推广的RSA密码体制和自确认密码体制。安全性分别基于环Z[ω]上整数的分解和Z[ω]环上离散对数的计算。 相似文献
17.
18.
19.
John F. Dooley 《Cryptologia》2019,43(4):344-358
The Beale ciphers are an interesting unsolved cryptographic puzzle, if for no other reason than their solution may uncover the location of a multimillion-dollar treasure. That is, if they are not a hoax. Over the years many cryptanalysts, amateur and professional, have tried and failed to decrypt the final two Beale ciphers. Recently, a number of writers have used the ciphers in their works of fiction. I review ten such novels and a short animated movie that all use the Beale ciphers as plot elements. The novels fall into two categories. First are novels where the objective is to solve the Beale ciphers and find the treasure. These novels use probable and improbable techniques to find the solutions. In some the solution occurs out of sight so the reader has no insight into the cryptanalysis. Second are novels where the existence of the Beale ciphers and their construction as book ciphers further a different story narrative. In these novels the Beale ciphers are mentioned and described but no attempt is made to solve them. There is usually another book cipher that must be solved instead. In conclusion, the Beale ciphers still seem to be generating significant interest. 相似文献
20.
详细分析了进位返加运算的进位序列, 通过对Fn2空间的划分,解决了计算进位返加运算进位序列的概率分布问题. 提出了一种计算进位返加与F2上异或运算“异或差值”概率分布的有效算法, 该算法的计算复杂度为O((n-1)/2). 解决了用模2加运算整体逼近进位返加运算时产生误差的概率分布,同时也反映了这2个运算的接近程度. 相似文献