全文获取类型
收费全文 | 2099篇 |
免费 | 65篇 |
国内免费 | 113篇 |
专业分类
系统科学 | 142篇 |
丛书文集 | 60篇 |
教育与普及 | 5篇 |
现状及发展 | 6篇 |
综合类 | 2062篇 |
自然研究 | 2篇 |
出版年
2024年 | 2篇 |
2023年 | 1篇 |
2022年 | 9篇 |
2021年 | 16篇 |
2020年 | 12篇 |
2019年 | 9篇 |
2018年 | 6篇 |
2017年 | 24篇 |
2016年 | 36篇 |
2015年 | 51篇 |
2014年 | 71篇 |
2013年 | 63篇 |
2012年 | 107篇 |
2011年 | 118篇 |
2010年 | 95篇 |
2009年 | 123篇 |
2008年 | 139篇 |
2007年 | 219篇 |
2006年 | 229篇 |
2005年 | 185篇 |
2004年 | 170篇 |
2003年 | 152篇 |
2002年 | 113篇 |
2001年 | 84篇 |
2000年 | 60篇 |
1999年 | 43篇 |
1998年 | 38篇 |
1997年 | 25篇 |
1996年 | 15篇 |
1995年 | 12篇 |
1994年 | 8篇 |
1993年 | 9篇 |
1992年 | 6篇 |
1991年 | 7篇 |
1990年 | 6篇 |
1989年 | 4篇 |
1988年 | 3篇 |
1987年 | 4篇 |
1986年 | 3篇 |
排序方式: 共有2277条查询结果,搜索用时 593 毫秒
121.
TANG Xueming WANG Xiaofei HONG Fan CUI Guohua 《武汉大学学报:自然科学英文版》2006,11(5):1267-1270
0 IntroductionThe security of most commonly used cryptographicschemesis essentially based onthree families of compu-tational problems :the integer factoring problem(RSAprob-lem) ,the Diffie-Hell man problemand the discrete logarithmproblem,andthe elliptic curve variants thereof .Inthe middleof 1990s , Shor[1], Bonehet al[2]presented some remarkablequantumalgorithms which can solveinteger factoring problemand discrete logarithmproblemover any group including Ga-lois fields and elliptic curve… 相似文献
122.
Mechanical Proofs about BW Multi-Party Contract Signing Protocol 总被引:1,自引:0,他引:1
ZHANG Ningrong ZHANG Xingyuan WANG Yuanyuan 《武汉大学学报:自然科学英文版》2006,11(6):1516-1520
123.
YUAN Linfeng YANG Zongkai CHENG Wenqing DU Xu 《武汉大学学报:自然科学英文版》2006,11(3):601-605
In order to minimize the energy consumption in the discovery of the routing path, this paper introduces a novel concept of effective transmission (ET) that ensures each forwarding node is not only farther from the source node, but also nearer to the destination node with respect to its sender, An energ-aware routing protocol based on ET is proposed. It enables the energy consumption for each hop to be the least for the transmission. The simulation results show the routing protocol is effective in the performance of energy consumption comparing with some other routing protocols. 相似文献
124.
ZHANG Jun KOU Weidong FAN Kai CAO Xuefei 《武汉大学学报:自然科学英文版》2006,11(6):1671-1674
A trusted third party introduced in watermarking protocols would decrease the security and affect the implementation of the protocols. In this paper, a new watermarking protocol with an un-trusted third party (UTTP) was proposed. Based on the idea of all-or-nothing disclosure of secret (ANDOS), all of the buyer, the seller and the third party didn't know the exact watermark, which was embedded in a digital content for tracing piracy. The proposed protocol provided mechanisms to trace piracy and protect customer's right. In addition, the problem that a seller colluded with UTTP to frame the buyer, namely, the conspiracy problem, could be avoided. 相似文献
125.
CHEN Jing CUI Guohua 《武汉大学学报:自然科学英文版》2006,11(6):1781-1784
In this paper, we propose a partially non-cryptographic security routing protocol (PNCSR) that protects both routing and data forwarding operations through the same reactive approach. PNCSR only apply public-key cryptographic system in managing token, but it doesn't utilize any cryptographic primitives on the routing messages. In PNCSR, each node is fair. Local neighboring nodes collaboratively monitor each other and sustain each other. It also uses a novel credit strategy which additively increases the token lifetime each time a node renews its token. We also analyze the storage, computation, and communication overhead of PNCSR, and provide a simple yet meaningful overhead comparison. Finally, the simulation results show the effectiveness of PNCSR in various situations. 相似文献
126.
本文介绍了网络监视器的基本功能,提供了用网络监视器设计网络实验的基本方法及已开设的网络实验项目,并通过一个具体实例分析实验结果. 相似文献
127.
The hybrid routing protocol has received more attention recently than the proactive and the reactive, especially for large-scale and highly dynamic connection, in mobile ad hoc network. A crucial reason is that zone-layered is being utilized in the complex systems. A hybrid routing algorithm which is layered zone based on adjacency connection(LZBAC) is put forward under the background of a few members in network with steady position and link. The algorithm modifies storage structure of nodes and improves routing mechanism. The theoretical analysis and simulation testing testify that the algorithm costs shorter time of route finding and less delay than others. 相似文献
128.
随着Internet的普及,网络安全问题变得日益重要,我们需要一种合法的手段来保证通讯双方的安全性,于是产生了一系列的协议.本文从密码协议中的自动执行协议入手,研究了基于公平硬币抛掷协议的智力扑克游戏,协议中应用RSA密钥体制.程序中应用的随机数发生器使通信的公平性得到了进一步的保证. 相似文献
129.
简要介绍了数据挖掘和安全多方计算,提出了一种高效的基于安全多方计算的保持隐私数据挖掘协议,并对协议的安全性、公平性、有效性和复杂度进行了分析. 相似文献
130.
为了扩展和丰富信息隐藏的载体,探讨了使用IPv6数据包进行信息隐藏的可能性,针对IPv6的不完善之处,对IPv6协议的数据包格式进行了详尽的分析,在此基础上发现了IPv6数据包中存在保留字段、转发时被节点忽略的字段、定义不完整字段和非关键字段等可隐匿信息的字段,这表明IPv6的冗余字段太多,协议设计时语法规则限定过宽,从而得出IPv6数据包是信息隐藏的良好载体的结论,上述字段构成了对象排序隐蔽通道等19种新的网络隐蔽通道,可用于特定目的的网络隐蔽通信,归纳了这些隐蔽通道的类型,对不同类型的隐蔽通道进行了阐述,最后对IPv6网络隐蔽通道的研究方向进行了展望。 相似文献