首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   101篇
  免费   15篇
  国内免费   7篇
电工技术   1篇
综合类   23篇
武器工业   1篇
无线电   23篇
一般工业技术   3篇
自动化技术   72篇
  2021年   1篇
  2019年   1篇
  2018年   2篇
  2017年   1篇
  2016年   2篇
  2014年   2篇
  2013年   20篇
  2012年   4篇
  2011年   11篇
  2010年   8篇
  2009年   6篇
  2008年   13篇
  2007年   6篇
  2006年   9篇
  2005年   3篇
  2004年   1篇
  2003年   8篇
  2002年   3篇
  2000年   2篇
  1999年   1篇
  1998年   2篇
  1997年   2篇
  1996年   2篇
  1995年   2篇
  1993年   2篇
  1992年   1篇
  1991年   2篇
  1989年   2篇
  1984年   1篇
  1983年   1篇
  1982年   2篇
排序方式: 共有123条查询结果,搜索用时 15 毫秒
111.
In this paper we present DNA-DBE,a DNA-chip-based dynamic broadcast encryption scheme.In our scheme,new users can join dynamically without modification of other users’decryption keys.Either the ciphertext or the decryption key is of constant-size.Backward secrecy is achieved in DNA-DBE:if new users join the system dynamically,they will not be able to retrieve past data.The security of our scheme relies on hard biological problems,which are immune to attacks of new computing technologies in the future.There exists a special feature in DNA–based cryptosystems,i.e.the set of encryption keys and the set of decryption keys have a many-to-many relationship.The implementation of more complicated DNA cryptosystems taking advantage of this special feature has been previously left as an open problem.Our DNA-DBE system is a solution to this open problem,which is also the first exploration of DNA based group-oriented encryption system.  相似文献   
112.
为防止子秘密在公开信道中传输,基于离散对数的难解性和模指数函数的可交换性,提出一种秘密共享方案。结果证明,参与者自己选取私钥可避免分发者的欺诈,降低分发者的负担,保证该方案的可重用,可信参与者可随时加入或退出参与者集合,确保该方案的动态性。  相似文献   
113.
114.
为防止子秘密在公开信道中传输,基于离散对数的难解性和模指数函数的可交换性,提出一种秘密共享方案。结果证明,参与者自己选取私钥可避免分发者的欺诈,降低分发者的负担,保证该方案的可重用,可信参与者可随时加入或退出参与者集合,确保该方案的动态性。  相似文献   
115.
针对信息互动系统的实际应用及面向移动环境的加密认证系统的特点,结合使用密码技术和硬件令牌的身份认证技术,设计了一个基于内置加密技术的USB Key便携加密认证系统模型.该系统使用了改进的RSA公钥密码技术和SHA-1单向散列函数,设计和实现了身份认证协议以及相关应用接口,可以安全和有效地解决应用中所面临的加密认证问题.  相似文献   
116.
Asymmetric encryption and signature method with DNA technology   总被引:1,自引:0,他引:1  
This paper proposes DNA-PKC, an asymmetric encryption and signature cryptosystem by combining the technologies of genetic engineering and cryptology. It is an exploratory research of biological cryptology. Similar to conventional public-key cryptology, DNA-PKC uses two pairs of keys for encryption and signature, respectively. Using the public encryption key, everyone can send encrypted message to a specified user, only the owner of the private decryption key can decrypt the ciphertext and recover the messag...  相似文献   
117.
提出了对DES算法的两点改进策略,在不改变原算法本身的基础上,对算法进行了简单得改进,使算法强度有较大的提高,并都用程序予以证明。  相似文献   
118.
Awareness of the need for true information security is steadily evolving in finance, industry and government, although action does not match rhetoric. There is a growing need for sophisticated security measures as evidenced by the increasing incidence of penetrations, at all levels of sophistication, of automated systems. These security measures can be developed and installed based on a procedure of risk analysis, security audit and design of countermeasure.  相似文献   
119.
Over the last decade, controversy has simmered over the degree to which the U.S. Federal government should control the publication of cryptographic research. The debate is not particularly heated at the present time; researchers seem to be waiting to see the results of a system of voluntary controls recommended last year by a panel of the American Council on Education.Despite the quiet, however, it is instructive to examine some of the history underlying the debate for several reasons beyond sheer curiosity. In the first place, such controls, whether voluntary or mandatory sanctions, could influence the future directions of civilian cryptographic research. Secondly, controversy or confrontation could still arise were a researcher to disagree with the results of the voluntary review. Finally, a recent speech by Admiral Inman, since retired as Deputy Director of the CIA, to the American Association for the Advancement of Science suggests that some in the U.S. Government would like to extend such controls to a much wider range of computer science and engineering research.This article is a brief and personal discussion of the principal components of the controversy by an author who found himself occasionally watching it from the sidelines and in some instances uncomfortably in the middle as an NSF project director responsible for some of the research under debate.  相似文献   
120.
《密码学》课程设置与教学方法探究   总被引:2,自引:0,他引:2  
讨论了信息安全等专业中《密码学》教学内容设置和教学方法问题。首先分析了《密码学》课程的特点和《密码学》课程设置所需注意的问题;其次设计了一个适用于无抽象代数和初等数论基础学生的《密码学》教学内容和课时分配方案;最后研究了《密码学》的教学方法和教学特点,总结了几点教学经验。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号