全文获取类型
收费全文 | 536篇 |
免费 | 129篇 |
国内免费 | 123篇 |
专业分类
电工技术 | 5篇 |
综合类 | 56篇 |
化学工业 | 31篇 |
金属工艺 | 7篇 |
机械仪表 | 7篇 |
建筑科学 | 7篇 |
矿业工程 | 1篇 |
能源动力 | 2篇 |
轻工业 | 11篇 |
水利工程 | 2篇 |
石油天然气 | 2篇 |
武器工业 | 3篇 |
无线电 | 169篇 |
一般工业技术 | 59篇 |
冶金工业 | 12篇 |
自动化技术 | 414篇 |
出版年
2024年 | 1篇 |
2023年 | 1篇 |
2022年 | 15篇 |
2021年 | 12篇 |
2020年 | 12篇 |
2019年 | 16篇 |
2018年 | 16篇 |
2017年 | 25篇 |
2016年 | 31篇 |
2015年 | 32篇 |
2014年 | 46篇 |
2013年 | 60篇 |
2012年 | 83篇 |
2011年 | 79篇 |
2010年 | 77篇 |
2009年 | 69篇 |
2008年 | 55篇 |
2007年 | 39篇 |
2006年 | 33篇 |
2005年 | 16篇 |
2004年 | 11篇 |
2003年 | 5篇 |
2002年 | 6篇 |
2001年 | 2篇 |
2000年 | 3篇 |
1999年 | 7篇 |
1998年 | 5篇 |
1997年 | 4篇 |
1996年 | 5篇 |
1995年 | 7篇 |
1994年 | 4篇 |
1993年 | 2篇 |
1992年 | 1篇 |
1991年 | 1篇 |
1988年 | 1篇 |
1986年 | 1篇 |
1984年 | 1篇 |
1983年 | 1篇 |
1982年 | 1篇 |
1976年 | 1篇 |
1959年 | 1篇 |
排序方式: 共有788条查询结果,搜索用时 31 毫秒
1.
This article presents a new method for pairing devices securely. The commitment-based authentication uses a fuzzy secret that the devices only know approximately. Its novel feature is time-based opening of commitments in a single round. We also introduce a new source for the fuzzy secret: synchronized drawing with two fingers of the same hand on two touch screens or surfaces. The drawings are encoded as strings and compared with an edit-distance metric. A prototype implementation of this surprisingly simple and natural pairing mechanism shows that it accurately differentiates between true positives and man-in-the-middle attackers. 相似文献
2.
基于RNA局部结构间的交互作用,提出一种含假结的RNA二级结构预测新方法LIFold。对给定的RNA序列,首先通过能量计算得到不含假结的能量最优结构,然后应用局部结构交互配对生成假结茎区,在已得到的最优结构基础上构建含假结的能量计算模型,最后通过优化算法得到含假结的RNA二级结构。应用该方法基于HotKnots测试数据的敏感性和阳性预测值(PPV)分别达到84%和80%,基于PseudoBase数据库测试数据的敏感性和阳性预测值分别达到78%和73%,与HotKnots、ILM、PknotsRG、IPknot及FlexStem等知名软件相比较,准确率均有所提高。 相似文献
3.
为了提升OFDM协作通信系统的网络覆盖率及网络容量,提出了一种基于子载波选择配对及功率优化分配的多跳中继OFDM系统优化算法。首先,通过在OFDM的系统模型上进行中继配对和非中继配对的性能分析,将子载波选择配对转换为一个整数规划问题,并采用基于匈牙利算法的规划方法进行配对矩阵的计算。接着,根据OFDM系统的功率分配问题,通过KKT条件对中继功率及电源功率进行优化,从而实现中继系统的功率优化分配 。最终的仿真结果表明,与统计质量QoS保证的资源分配方案以及OFDM中继系统异构服务的资源分配算法相比,所提出的方法在提高网络覆盖率和容量上均表现出更好的效果。 相似文献
4.
周才学 《计算机工程与科学》2016,38(11):2246-2253
对六个签密方案进行了安全性分析,指出它们都存在保密性的安全问题,其中两个方案还存在不可伪造性的安全问题。对每一个安全问题都给出了具体的攻击方法,并使用加密部分绑定发送者、签名部分绑定接收者、验证等式不含明文信息和部分私钥生成时绑定公钥的方法对每一个方案给出了改进措施。对改进后的方案给出了随机预言机模型下的安全性证明。安全分析表明,改进方案是安全的。最后提出了设计签密方案时必须注意的几个问题。 相似文献
5.
Perfect forward secure identity-based authenticated key agreement protocol in the escrow mode 总被引:1,自引:0,他引:1
CHOO Kim-Kwang Raymond 《中国科学F辑(英文版)》2009,52(8):1358-1370
The majority of existing escrowable identity-based key agreement protocols only provide partial forward secrecy. Such protocols are, arguably, not suitable for many real-word applications, as the latter tends to require a stronger sense of forward secrecy—perfect forward secrecy. In this paper, we propose an efficient perfect forward-secure identity-based key agreement protocol in the escrow mode. We prove the security of our protocol in the random oracle model, assuming the intractability of the Gap Biline... 相似文献
6.
基于椭圆曲线和Weil配对数学理论发明了具体可实施的基于身份密码的技术方案,但其一大缺陷就是密钥更新问题.介绍了一种时间分层的基于身份密码技术的算法和系统,其采用多个主密钥分量,逐级更新用户私钥,与PKG对接的顶级中间设备的帮助密钥更新时间相对较长,而用户终端保存的用户私钥更新时间相对较短,这样既满足了用户私钥更新频度的需要,又不引起系统频繁更新用户私钥所造成的沉重负荷. 相似文献
7.
Most conventional conference key agreement protocols have not been concerned with a practical situation. There may exist some
malicious conferees who attempt to block conference initiation for some purposes, e.g. commercial, political or military benefit.
Instances where conference must be launched immediately due to emergency, efficient detection of malicious behavior would
be needed. Recently, Tzeng (IEEE Trans. Comput. 51(4):373–379, 2002) proposed a fault-tolerant conference key agreement protocol
to address the issue where a conference key can be established among conferees even though malicious conferees exist. However,
his protocol might be complex and inefficient during fault-detection. In the case where a malicious conferee exists and a
fault-tolerant mechanism is launched, complicated interactions between conferees will be required. In this paper, we introduce
a novel strategy, where any malicious conferee may be identified and removed from the conferee list without any interaction.
With such a non-interactive fault-tolerance, conferences could be established and started efficiently. A complete example
of our protocol will be given to describe the fascinating fault-tolerance. We analyse the security of our protocol regarding
four aspects, i.e. correctness, fault-tolerance, active attack and passive attack. The comparisons of performance between
our protocol and that of Tzeng are also shown. As a whole, the advantage of our protocol is superior to that of Tzeng under
the situation where malicious conferees exist.
相似文献
Chi-Sung LaihEmail: |
8.
K. Levin Y. Zha R. J. Radtke Q. Si M. R. Norman H. -B. Schüttler 《Journal of Superconductivity》1994,7(3):563-570
We review the spin dynamics of the normal state of the cuprates with special emphasis on neutron data in both the YBa2Cu3O7– and La2–x
Sr
x
CuO4 systems. When realistic models of the Fermi surface shapes are incorporated, along with a moderate degree of spin fluctuations, we find good semiquantitative agreement with experiment for both cuprates. Building on the success of this Fermi-liquid-based scheme, we explore the implications ford-wave pairing from a number of vantage points. We conclude that our present experimental and theoretical understanding is inadequate to confirm or refute thed-wave scenario. 相似文献
9.
J. Ashkenazi 《Journal of Superconductivity》1995,8(5):559-562
The electronic structure of the high-T
c
cuprates is studied on the basis of large-U and smallU orbitals. Two types of charge carriers are predicted: (i) spinless polarons with a very small bandwidth; (ii) anomalous carriers of both charge and spin. The results are consistent with many anomalous properties of the cuprates. The spinless polarons undergo a CDW transition, and transitions between pair states of the two types of carriers provide the pairing mechanism.The author acknowledges stimulating discussions with participants of the workshop. Some numerical work was performed at the Florida State University Computing Center. 相似文献
10.
Based on the computational Diffie-Hellman problem, this paper proposes an identity-based authenticated key agreement protocol which removes bilinear pairings. Compared with previous protocols, the new protocol minimizes message exchange time with no extra cost. The protocol provides strong security guarantees including key compromise impersonation resilience, perfect forward secrecy, and master key forward secrecy. A security proof with the modular approach in the modified Bellare-Rogaway model is also provided. 相似文献