全文获取类型
收费全文 | 3202篇 |
免费 | 87篇 |
国内免费 | 127篇 |
专业分类
系统科学 | 85篇 |
丛书文集 | 134篇 |
教育与普及 | 111篇 |
理论与方法论 | 7篇 |
现状及发展 | 10篇 |
研究方法 | 13篇 |
综合类 | 3056篇 |
出版年
2024年 | 23篇 |
2023年 | 45篇 |
2022年 | 76篇 |
2021年 | 79篇 |
2020年 | 52篇 |
2019年 | 30篇 |
2018年 | 32篇 |
2017年 | 49篇 |
2016年 | 37篇 |
2015年 | 98篇 |
2014年 | 115篇 |
2013年 | 101篇 |
2012年 | 120篇 |
2011年 | 111篇 |
2010年 | 135篇 |
2009年 | 149篇 |
2008年 | 143篇 |
2007年 | 137篇 |
2006年 | 124篇 |
2005年 | 107篇 |
2004年 | 88篇 |
2003年 | 107篇 |
2002年 | 103篇 |
2001年 | 119篇 |
2000年 | 84篇 |
1999年 | 153篇 |
1998年 | 146篇 |
1997年 | 134篇 |
1996年 | 111篇 |
1995年 | 110篇 |
1994年 | 107篇 |
1993年 | 80篇 |
1992年 | 78篇 |
1991年 | 62篇 |
1990年 | 45篇 |
1989年 | 40篇 |
1988年 | 35篇 |
1987年 | 22篇 |
1986年 | 16篇 |
1985年 | 11篇 |
1984年 | 2篇 |
排序方式: 共有3416条查询结果,搜索用时 15 毫秒
191.
TANG Xueming WANG Xiaofei HONG Fan CUI Guohua 《武汉大学学报:自然科学英文版》2006,11(5):1267-1270
0 IntroductionThe security of most commonly used cryptographicschemesis essentially based onthree families of compu-tational problems :the integer factoring problem(RSAprob-lem) ,the Diffie-Hell man problemand the discrete logarithmproblem,andthe elliptic curve variants thereof .Inthe middleof 1990s , Shor[1], Bonehet al[2]presented some remarkablequantumalgorithms which can solveinteger factoring problemand discrete logarithmproblemover any group including Ga-lois fields and elliptic curve… 相似文献
192.
WANG Xiaofei HONG Fan~ TANG Xueming CUI Guohua College of Computer Science Technology Huazhong University of Science Technology Wuhan Hubei China 《武汉大学学报:自然科学英文版》2006,11(6):1467-1472
0 IntroductionDigital signatureis a key technique to provide datainteg-rity andsource authenticationcapabilities to enhance da-ta trustworthiness in trusted computing platform. Most cur-rent digital signature schemes are based on complex mathe-matical problems , such as integer factoring, discrete log-arithm,and discrete logarithm on elliptic curves . The hard-ness of these underlying mathematical problems is really un-certain at present . Merkle treeis a method used for authenti-cation and di… 相似文献
193.
SU Li CUI Guohua YANG Muxiang CHEN Jing 《武汉大学学报:自然科学英文版》2006,11(6):1485-1488
The subliminal channel is used to send a secret message to an authorized receiver; the message cannot he discovered by any unauthorized receivers. Designated verifier signature (DVS) provide authentication of a message, we design a DVS scheme with message recovery mechanism and use it as a subliminal channel. In order to share a message among n users securely and allows t or more users can reconstruct the secret in dynamic groups, we combine both subliminal channel and (t, n) threshold cryptography. Then we proposed a threshold subliminal channel which can convey a subliminal message to a group of users based on message-recovery designated verifier signatures. Reconstructing the subliminal message relies on the cooperation of t or more users in the group and they can verify the validity of the subliminal message. Security and performance analysis show that the proposed scheme is secure and efficient. 相似文献
194.
WANG Youren WANG Li YAO Rui ZHANG Zhai CUI Jiang 《武汉大学学报:自然科学英文版》2006,11(6):1569-1572
Reconfigurable computing has grown to become an important and large field of research, it offers advantages over traditional hardware and software implementations of computational algorithms. The Advanced Encryption Standard (AES) algorithm is widely applied in government department and commerce. This paper analyzed the AES algorithms with different cipher keys, adopted a novel key scheduler that generated the round key real-time, proposed a dynamically reconfigurable encryption system which supported the AES algorithm with different cipher keys, and designed the architecture of the reconfigurable system. The dynamically reconfigurable AES system had been realized on FPGA. The result proves that the reconfigurable AES system is flexible, lower cost and high security level. 相似文献
195.
CHEN Jing CUI Guohua 《武汉大学学报:自然科学英文版》2006,11(6):1781-1784
In this paper, we propose a partially non-cryptographic security routing protocol (PNCSR) that protects both routing and data forwarding operations through the same reactive approach. PNCSR only apply public-key cryptographic system in managing token, but it doesn't utilize any cryptographic primitives on the routing messages. In PNCSR, each node is fair. Local neighboring nodes collaboratively monitor each other and sustain each other. It also uses a novel credit strategy which additively increases the token lifetime each time a node renews its token. We also analyze the storage, computation, and communication overhead of PNCSR, and provide a simple yet meaningful overhead comparison. Finally, the simulation results show the effectiveness of PNCSR in various situations. 相似文献
196.
CUI Xinchun QIN Xiaolin SHENG Gang 《武汉大学学报:自然科学英文版》2007,12(1):79-82
0 Introduction Watermarking relational database become a hotspot in recent years, it aims to protect copyrights by intro- ducing small errors into the original content without af- fecting the usability for intended purpose. Although some pioneer efforts h… 相似文献
197.
服务质量管理模式的研究 总被引:10,自引:0,他引:10
阐述了服务质量的含义,然后构造出一个以顾客为中心的服务质量管理模式。它包括一个服务三角形,由服务战略,服务系统、服务人员三个因素构成,这三个因素都面向顾客这个中心,彼此又相互关联。 相似文献
198.
审计日志的关联规则挖掘 总被引:2,自引:0,他引:2
研究了在入侵检测系统中利用数据挖掘技术从审计日志中挖掘关联规则的方法,针对现有关联规则算法应用于入侵检测系统引起的问题,提出了利用本质属性限制无趣规则的产生、利用行向量的位运算提高Apriori算法时间性能的一种高效改进算法。该算法不需生成候选频繁集和剪枝操作,避免了因无趣规则引起的大量运算。因而能提高入侵检测系统的效率。 相似文献
199.
200.
C200H可编程控制器在RGR20型滚揉机上的应用 总被引:2,自引:0,他引:2
提出将 OMRON C2 0 0 H可编程控制器用于 RGR2 0型滚揉机 ,给出了一种用二极管扩展输入口的方法。结果表明 ,由于采用可编程控制器作为控制系统的核心 ,该设备具有高可靠性 ,同时也具有参数设置直观、方便 ,操作安全、简单等优点 ,可预存 80个程序 ,以便在生产不同种类的产品时直接调用 相似文献