全文获取类型
收费全文 | 2504篇 |
免费 | 76篇 |
国内免费 | 117篇 |
专业分类
系统科学 | 147篇 |
丛书文集 | 67篇 |
教育与普及 | 16篇 |
现状及发展 | 6篇 |
综合类 | 2459篇 |
自然研究 | 2篇 |
出版年
2024年 | 3篇 |
2023年 | 3篇 |
2022年 | 16篇 |
2021年 | 24篇 |
2020年 | 18篇 |
2019年 | 12篇 |
2018年 | 10篇 |
2017年 | 32篇 |
2016年 | 42篇 |
2015年 | 62篇 |
2014年 | 103篇 |
2013年 | 81篇 |
2012年 | 141篇 |
2011年 | 172篇 |
2010年 | 121篇 |
2009年 | 144篇 |
2008年 | 176篇 |
2007年 | 263篇 |
2006年 | 254篇 |
2005年 | 199篇 |
2004年 | 183篇 |
2003年 | 157篇 |
2002年 | 119篇 |
2001年 | 97篇 |
2000年 | 66篇 |
1999年 | 51篇 |
1998年 | 40篇 |
1997年 | 26篇 |
1996年 | 16篇 |
1995年 | 12篇 |
1994年 | 9篇 |
1993年 | 11篇 |
1992年 | 6篇 |
1991年 | 7篇 |
1990年 | 6篇 |
1989年 | 4篇 |
1988年 | 4篇 |
1987年 | 4篇 |
1986年 | 3篇 |
排序方式: 共有2697条查询结果,搜索用时 31 毫秒
161.
首先介绍了IPSec协议的两种工作模式以及这些模式下IP包的变化,继而阐述了密钥交换协议的功能与操作过程。在对加密算法与IP报文加密了解的基础上,详细说明了认证头与封装安全载荷对外出和进入数据包的处理方式以及检查完整性检查值的整个过程,分析了IPSec在安全网关中的一些最新技术运用。最后提供了一种基于虚拟专用网技术的安全网关实现方式。 相似文献
162.
TANG Xueming WANG Xiaofei HONG Fan CUI Guohua 《武汉大学学报:自然科学英文版》2006,11(5):1267-1270
0 IntroductionThe security of most commonly used cryptographicschemesis essentially based onthree families of compu-tational problems :the integer factoring problem(RSAprob-lem) ,the Diffie-Hell man problemand the discrete logarithmproblem,andthe elliptic curve variants thereof .Inthe middleof 1990s , Shor[1], Bonehet al[2]presented some remarkablequantumalgorithms which can solveinteger factoring problemand discrete logarithmproblemover any group including Ga-lois fields and elliptic curve… 相似文献
163.
Mechanical Proofs about BW Multi-Party Contract Signing Protocol 总被引:1,自引:0,他引:1
ZHANG Ningrong ZHANG Xingyuan WANG Yuanyuan 《武汉大学学报:自然科学英文版》2006,11(6):1516-1520
164.
YUAN Linfeng YANG Zongkai CHENG Wenqing DU Xu 《武汉大学学报:自然科学英文版》2006,11(3):601-605
In order to minimize the energy consumption in the discovery of the routing path, this paper introduces a novel concept of effective transmission (ET) that ensures each forwarding node is not only farther from the source node, but also nearer to the destination node with respect to its sender, An energ-aware routing protocol based on ET is proposed. It enables the energy consumption for each hop to be the least for the transmission. The simulation results show the routing protocol is effective in the performance of energy consumption comparing with some other routing protocols. 相似文献
165.
LUO Ting YUAN Jun HONG Fan 《武汉大学学报:自然科学英文版》2006,11(6):1636-1640
For the purpose of deterring unauthorized duplication and distribution of multimedia contents in e-commerce, some Buyer-seller watermarking protocols which combine of traditional watermarking and fingerprinting techniques have been proposed, However, previous protocols have potential risk from trust third party (TTP) because all entities (including multi-buyers and multi-sellers) mentioned in protocol construct a star tupology like connection, in which the watermark certification authority (WCA) serves as the central point in the interaction and therefore its availability probably turns out to be the vital bottleneck of reliability and efficiency to the whole system. Secondly, WCA holds entire information about watermark used hy Buyers so that an innocent Buyer can he found as guilty if WCA collude with the Seller. In this paper, we propose a watermarking protocol to address the problems using cryptographic technologies in phase of watermark generation. The resuh is a TTP-independent and collusion-secure buyer-seller watermarking protocol. 相似文献
166.
ZHANG Jun KOU Weidong FAN Kai CAO Xuefei 《武汉大学学报:自然科学英文版》2006,11(6):1671-1674
A trusted third party introduced in watermarking protocols would decrease the security and affect the implementation of the protocols. In this paper, a new watermarking protocol with an un-trusted third party (UTTP) was proposed. Based on the idea of all-or-nothing disclosure of secret (ANDOS), all of the buyer, the seller and the third party didn't know the exact watermark, which was embedded in a digital content for tracing piracy. The proposed protocol provided mechanisms to trace piracy and protect customer's right. In addition, the problem that a seller colluded with UTTP to frame the buyer, namely, the conspiracy problem, could be avoided. 相似文献
167.
CHEN Jing CUI Guohua 《武汉大学学报:自然科学英文版》2006,11(6):1781-1784
In this paper, we propose a partially non-cryptographic security routing protocol (PNCSR) that protects both routing and data forwarding operations through the same reactive approach. PNCSR only apply public-key cryptographic system in managing token, but it doesn't utilize any cryptographic primitives on the routing messages. In PNCSR, each node is fair. Local neighboring nodes collaboratively monitor each other and sustain each other. It also uses a novel credit strategy which additively increases the token lifetime each time a node renews its token. We also analyze the storage, computation, and communication overhead of PNCSR, and provide a simple yet meaningful overhead comparison. Finally, the simulation results show the effectiveness of PNCSR in various situations. 相似文献
168.
本文介绍了网络监视器的基本功能,提供了用网络监视器设计网络实验的基本方法及已开设的网络实验项目,并通过一个具体实例分析实验结果. 相似文献
169.
The hybrid routing protocol has received more attention recently than the proactive and the reactive, especially for large-scale and highly dynamic connection, in mobile ad hoc network. A crucial reason is that zone-layered is being utilized in the complex systems. A hybrid routing algorithm which is layered zone based on adjacency connection(LZBAC) is put forward under the background of a few members in network with steady position and link. The algorithm modifies storage structure of nodes and improves routing mechanism. The theoretical analysis and simulation testing testify that the algorithm costs shorter time of route finding and less delay than others. 相似文献
170.
随着Internet的普及,网络安全问题变得日益重要,我们需要一种合法的手段来保证通讯双方的安全性,于是产生了一系列的协议.本文从密码协议中的自动执行协议入手,研究了基于公平硬币抛掷协议的智力扑克游戏,协议中应用RSA密钥体制.程序中应用的随机数发生器使通信的公平性得到了进一步的保证. 相似文献