全文获取类型
收费全文 | 5851篇 |
免费 | 837篇 |
国内免费 | 768篇 |
专业分类
电工技术 | 170篇 |
综合类 | 609篇 |
化学工业 | 126篇 |
金属工艺 | 192篇 |
机械仪表 | 258篇 |
建筑科学 | 363篇 |
矿业工程 | 47篇 |
能源动力 | 39篇 |
轻工业 | 225篇 |
水利工程 | 75篇 |
石油天然气 | 127篇 |
武器工业 | 39篇 |
无线电 | 1481篇 |
一般工业技术 | 253篇 |
冶金工业 | 55篇 |
原子能技术 | 43篇 |
自动化技术 | 3354篇 |
出版年
2024年 | 26篇 |
2023年 | 90篇 |
2022年 | 181篇 |
2021年 | 180篇 |
2020年 | 209篇 |
2019年 | 192篇 |
2018年 | 178篇 |
2017年 | 214篇 |
2016年 | 235篇 |
2015年 | 285篇 |
2014年 | 449篇 |
2013年 | 404篇 |
2012年 | 559篇 |
2011年 | 527篇 |
2010年 | 456篇 |
2009年 | 435篇 |
2008年 | 480篇 |
2007年 | 461篇 |
2006年 | 367篇 |
2005年 | 335篇 |
2004年 | 284篇 |
2003年 | 225篇 |
2002年 | 166篇 |
2001年 | 120篇 |
2000年 | 86篇 |
1999年 | 56篇 |
1998年 | 57篇 |
1997年 | 37篇 |
1996年 | 38篇 |
1995年 | 43篇 |
1994年 | 13篇 |
1993年 | 9篇 |
1992年 | 9篇 |
1991年 | 6篇 |
1990年 | 1篇 |
1989年 | 2篇 |
1988年 | 5篇 |
1987年 | 1篇 |
1986年 | 1篇 |
1985年 | 6篇 |
1984年 | 8篇 |
1983年 | 3篇 |
1982年 | 8篇 |
1981年 | 3篇 |
1980年 | 2篇 |
1977年 | 1篇 |
1972年 | 1篇 |
1966年 | 1篇 |
1961年 | 1篇 |
排序方式: 共有7456条查询结果,搜索用时 15 毫秒
61.
大型网络运行着许多网络设备,网管员可以采用本地认证方式来登录到这些设备进行相关操作。对于大量设备和帐号信息,可使用Excel表来管理,但这些帐号信息必须同步到相关设备才有意义,若采用手工方式来同步既繁琐又费时。针对这个问题,借助perl脚本程序,基于该Excel表,对这些网络设备的用户帐号进行维护,不失为一种可行方法。 相似文献
62.
当前,电子政务信息系统已经成为转变政府职能、提高行政效率的有效手段。基层政府部门电子政务系统具有建设资金有限、用户数量少且分散的特点,常依托互联网运行,重要和敏感信息面临巨大安全风险。本文针对该安全需求,提出研制与VPN系统集成的加密设备,实现基于互联网电子政务系统安全、高速加密传输和用户身份鉴别,解决该类系统面临的主要信息安全问题,并最大程度降低传输专线、电子CA认证等系统建设的高昂成本。 相似文献
63.
《Information Security Journal: A Global Perspective》2013,22(5):231-242
ABSTRACT Cryptographic hash functions play a crucial role in networking and communication security, including their use for data integrity and message authentication. Keccak hash algorithm is one of the finalists in the next generation SHA-3 hash algorithm competition. It is based on the sponge construction whose hardware performance is worth investigation. We developed an efficient hardware architecture for the Keccak hash algorithm on Field-Programmable Gate Array (FPGA). Due to the serialization exploited in the proposed architecture, the area needed for its implementation is reduced significantly accompanied by higher efficiency rate. In addition, low latency is attained so that higher operating frequencies can be accessed. We use the coprocessor approach which exploits the use of RAM blocks that exist in most FPGA platforms. For this coprocessor, a new datapath structure allowing parallel execution of multiple instructions is designed. Implementation results prove that our Keccak coprocessor achieves high performance in a small area. 相似文献
64.
《Information Security Journal: A Global Perspective》2013,22(1-2):10-21
ABSTRACTAuthentication using images (i.e., graphical passwords) is claimed to be one of the alternatives for overcoming weaknesses in the traditional username and password authentication. This paper reports on the study to explore the feasibility of combining two graphical password methods for better security. A graphical password prototype scheme, the Enhanced Graphical Authentication System (EGAS), was developed (which combines the methods of clicking on the image (i.e., click-based) and selecting a series of images (i.e., choice-based). The EGAS was tested by 30 participants randomly chosen from the authors’ university and two evaluations were made; namely user performance of the combined method and the feasibility of authentication strategies toward the introduced method itself. From both evaluations, it is found that positive results have been obtained, which suggest that these methods could be combined together effectively without giving impediment to users. 相似文献
65.
《Information Security Journal: A Global Perspective》2013,22(4):182-190
ABSTRACT A password-based authentication is still the most prevalent authentication method because of its convenience and easy implementations. Since a password is transmitted via network, it has an inherent vulnerability of password exposure to an attacker. A one-time password system reduces the risk of a security breach even when a password is exposed to an attacker, because the password is only meaningful at a given time. A grid data security system uses a technology, GridOne?, which allows the use of a one-time password without requiring preinstalled hardware or software infrastructures, and it provides strong security over conventional password-based authentication systems. We analyzed the weakness of the grid data security authentication system and provide a suggestion to compensate for its vulnerability. 相似文献
66.
《Information Security Journal: A Global Perspective》2013,22(5):248-256
ABSTRACT A mobile ad-hoc network (MANET) is an autonomous system of mobile nodes connected by wireless links in which nodes cooperate by forwarding packets for each other thereby enabling communication beyond direct wireless transmission range. Example applications include battlefield communication, disaster recovery operations, and mobile conferencing. The dynamic nature of ad-hoc networks makes them more vulnerable to security attacks compared with fixed networks. Providing security in mobile ad-hoc networks has been a major issue in recent years. Most of the secure routing protocols proposed by researchers need a centralized authority or a trusted third party to provide authentication. This destroys the self-organizing nature of ad-hoc networks. Black Hole attack is one of the routing attacks that occur in MANETs. In this attack, a malicious node uses the routing protocol to advertise itself as having the shortest path to the node whose packets it wants to intercept. In this article, we propose an enhanced certificate based authentication mechanism, where nodes authenticate each other by issuing certificates to neighboring nodes and generating public key without the need of any online centralized authority. The proposed scheme uses Multicast Ad-hoc On Demand Distance Vector Routing (MAODV) protocol as a support for certification. The effectiveness of our mechanism is illustrated by simulations conducted using network simulator ns-2. 相似文献
67.
Toxic and Potent Chinese Materia Medica (T/PCMM) is a special and very important category of Chinese medicines. They have long been used in traditional medical practice and are being used more and more widely throughout the world in recent years. As there may be many fatal toxic effects caused by misusing or confusion of T/PCMM, their quality and safety control arouse increasing attention internationally. Researches on the accurate identification to ensure the safe use of T/PCMM are acquired; however, there are few reports on authentication. We are carrying out a series of studies on 31 T/PCMM originating from plants, animals, minerals, and secreta. In our previous studies, we proved that modern microscopic authentication is a simple, fast, effective, low cost, and less toxic method for identifying animal, seed, and flower T/PCMM. In the present study, we focused on the authentication of four kinds of mineral arsenicals, including orpiment (mainly containing As2S3), realgar (mainly containing As4S4), arsenolite, and arsenic trioxide (mainly containing As2O3). We examined the macroscopic and microscopic characteristics of the above minerals and found that they all can be easily identified and authenticated by using light microscopy coupled with polarized microscopy. Moreover, the authentication results for arsenolite and arsenic trioxide are confirmed by ICP‐MS analysis. We are sure that the morphological and microscopic characteristics indicated here are indispensable to establishing standards for these four mineral T/PCMMs. Microsc. Res. Tech. 74:1‐8, 2011. © 2010 Wiley‐Liss, Inc. 相似文献
68.
69.
70.
移动平台的下载业务是除消息类业务外另一类重要的移动增值数据服务,对下载过程的有效管理和控制是该业务稳定运营的前提。下载数据的完整性是下载业务的核心内容。描述了移动平台下载业务内容完整性校验方案。提出了Merkle树在移动平台内容完整性校验上的实现策略,该策略通过缩短校验值在网络传输中的大小,来有效减少完整性校验的代价。理论分析与工程项目证明,该机制具有较高的安全连通性和较低的网络延迟。 相似文献