全文获取类型
收费全文 | 567篇 |
免费 | 100篇 |
国内免费 | 71篇 |
专业分类
电工技术 | 8篇 |
综合类 | 92篇 |
机械仪表 | 1篇 |
矿业工程 | 1篇 |
轻工业 | 5篇 |
武器工业 | 1篇 |
无线电 | 184篇 |
一般工业技术 | 10篇 |
冶金工业 | 1篇 |
自动化技术 | 435篇 |
出版年
2024年 | 2篇 |
2023年 | 5篇 |
2022年 | 8篇 |
2021年 | 8篇 |
2020年 | 11篇 |
2019年 | 10篇 |
2018年 | 13篇 |
2017年 | 12篇 |
2016年 | 12篇 |
2015年 | 15篇 |
2014年 | 18篇 |
2013年 | 39篇 |
2012年 | 42篇 |
2011年 | 50篇 |
2010年 | 51篇 |
2009年 | 43篇 |
2008年 | 52篇 |
2007年 | 74篇 |
2006年 | 51篇 |
2005年 | 39篇 |
2004年 | 34篇 |
2003年 | 22篇 |
2002年 | 17篇 |
2001年 | 20篇 |
2000年 | 22篇 |
1999年 | 17篇 |
1998年 | 10篇 |
1997年 | 9篇 |
1996年 | 5篇 |
1995年 | 4篇 |
1994年 | 4篇 |
1993年 | 2篇 |
1992年 | 6篇 |
1991年 | 3篇 |
1990年 | 2篇 |
1989年 | 1篇 |
1988年 | 1篇 |
1985年 | 1篇 |
1982年 | 2篇 |
1980年 | 1篇 |
排序方式: 共有738条查询结果,搜索用时 0 毫秒
651.
韦大伟 《微电子学与计算机》2006,23(Z1):46-48
结合对称加密技术和门限加密技术,提出了一种适用于分布式数据存储需要的有效的系统机密性保护方案,其中对称加密技术用于对所存储的文件进行加密,分布式门限加密技术则对对称加密方案中所用的密钥进行保护,可在不带来密钥存储问题情况下满足恶意环境中分布式数据存储系统的机密性要求。 相似文献
652.
653.
本文提出了一个基于椭圆曲线密码体制(ECC)的、定期更新的可验证的秘密共享方案.该方案具有子秘密定期更新、子秘密可验证和可防欺诈的特点.方案的安全性基于求解有限域上椭圆曲线离散对数问题(ECDLP)的难解性. 相似文献
654.
This study presents a Montgomery multiplication architecture that uses an irreducible all one polynomial (AOP) in GF(2 m ) based on a programmable cellular automata (PCA). The proposed architecture has the advantage of high regularity and a reduced latency based on combining the characteristics of the irreducible AOP and PCA. The proposed architecture can be used to implement modular exponentiation, division, and inversion architectures. 相似文献
655.
656.
The Internet of Things-based smart healthcare provides numerous facilities to patients and medical professionals. Medical professionals can monitor the patient's real-time medical data and diagnose diseases through the medical health history stored in the cloud database. Any kind of attack on the cloud database will result in misdiagnosis of the patients by medical professionals. Therefore, it becomes a primary concern to secure private data. On the other hand, the conventional data aggregation method for smart healthcare acquires immense communication and computational cost. Edge-enabled smart healthcare can overcome these limitations. The paper proposes an edge-enabled efficient privacy-preserving data aggregation (EEPPDA) scheme to secure health data. In the EEPPDA scheme, captured medical data have been encrypted by the Paillier homomorphic cryptosystem. Homomorphic encryption is engaged in the assurance of secure communication. For data transmission from patients to the cloud server (CS), data aggregation is performed on the edge server (ES). Then aggregated ciphertext data are transmitted to the CS. The CS validates the data integrity and analyzes and processes the authenticated aggregated data. The authorized medical professional executes the decryption, then the aggregated ciphertext data are decrypted in plaintext. EEPPDA utilizes the batch verification process to reduce communication costs. Our proposed scheme maintains the privacy of the patient's identity and medical data, resists any internal and external attacks, and verifies the health data integrity in the CS. The proposed scheme has significantly minimized computational complexity and communication overhead concerning the existing approach through extensive simulation. 相似文献
657.
658.
针对后量子时代的网络通信安全问题,对编码密码中的Niederreiter密码体制进行研究,将基于改进Niederreiter密码的双公钥加密方案与Xinmei签名方案相结合,构造一种抗量子签密方案。安全性分析结果表明,该方案能够满足IND-CPA与EUF-CMA安全,并可实现对直接译码攻击以及ISD攻击的良好防御,相比先签名后加密的签密方法,其密文量下降50%,能够为后量子时代用户的网络通信提供机密性与不可伪造性的安全防护。 相似文献
659.
将物理不可克隆函数(Physical Unclonable Function,PUF)与椭圆曲线上的无证书公钥密码体制相结合,提出一种面向物联网的安全通信方案,在节点设备不存储任何秘密参数的情况下,实现设备间消息的安全传递.方案无需使用高计算复杂度的双线性对运算,并提供了消息认证机制.安全性分析表明,该方案不仅能够抵抗窃听、篡改、重放等传统攻击,而且可以有效防范节点设备可能遭到的复制攻击.对比结果显示,相较于同类方案,该方案明显降低了设备的资源开销. 相似文献
660.
Qi Jiang Yuanyuan Qian Jianfeng Ma Xindi Ma Qingfeng Cheng Fushan Wei 《International Journal of Communication Systems》2019,32(6)
Wearable devices, which provide the services of collecting personal data, monitoring health conditions, and so on, are widely used in many fields, ranging from sports to healthcare. Although wearable devices bring convenience to people's lives, they bring about significant security concerns, such as personal privacy disclosure and unauthorized access to wearable devices. To ensure the privacy and security of the sensitive data, it is critical to design an efficient authentication protocol suitable for wearable devices. Recently, Das et al proposed a lightweight authentication protocol, which achieves secure communication between the wearable device and the mobile terminal. However, we find that their protocol is vulnerable to offline password guessing attack and desynchronization attack. Therefore, we put forward a user centric three‐factor authentication scheme for wearable devices assisted by cloud server. Informal security analysis and formal analysis using ProVerif is executed to demonstrate that our protocol not only remedies the flaws of the protocol of Das et al but also meets desired security properties. Comparison with related schemes shows that our protocol satisfies security and usability simultaneously. 相似文献