全文获取类型
收费全文 | 1176篇 |
免费 | 201篇 |
国内免费 | 238篇 |
学科分类
工业技术 | 1615篇 |
出版年
2024年 | 2篇 |
2023年 | 13篇 |
2022年 | 30篇 |
2021年 | 30篇 |
2020年 | 44篇 |
2019年 | 39篇 |
2018年 | 27篇 |
2017年 | 38篇 |
2016年 | 47篇 |
2015年 | 51篇 |
2014年 | 111篇 |
2013年 | 103篇 |
2012年 | 146篇 |
2011年 | 162篇 |
2010年 | 150篇 |
2009年 | 111篇 |
2008年 | 110篇 |
2007年 | 100篇 |
2006年 | 98篇 |
2005年 | 47篇 |
2004年 | 52篇 |
2003年 | 40篇 |
2002年 | 19篇 |
2001年 | 15篇 |
2000年 | 8篇 |
1999年 | 7篇 |
1997年 | 2篇 |
1996年 | 1篇 |
1995年 | 3篇 |
1994年 | 2篇 |
1993年 | 3篇 |
1990年 | 1篇 |
1974年 | 1篇 |
1965年 | 1篇 |
1956年 | 1篇 |
排序方式: 共有1615条查询结果,搜索用时 15 毫秒
1.
2.
范文跃 《信息安全与通信保密》2006,(8):66-68
在分析移动智能平台安全需求基础上,从逻辑原理、硬件组成、软件系统三个层面提出了移动智能平台的可信计算体系结构,之后提出了包含十种可信计算应用功能的全景图。 相似文献
3.
4.
5.
Panagiotis N. Zarros Myung J. Lee Tarek N. Saadawi 《Journal of Network and Systems Management》1994,2(4):361-382
In this paper, an algorithm to determine the set of packets generated continuously and periodically from different participants that are arriving at a node either for mixing at the master of a conference, or for simply playing back at a regular participant of a conference, is proposed. The essence of the algorithm is to estimate the expected packet arrival time (or reference time) for each participant. With the reference time at hand, the maximum jitter and the optimum waiting time for a mixer to wait packets from all participants can be determined. An enhancement to improve synchronization which deals with the estimation of the time offsets between the individual periods of the sources and the period of the receiver is also presented. The error of the proposed algorithm is enumerated by the Chernoff bound and demonstrated by simulation and is shown to be acceptable in practical application. The algorithm can also be employed when traffic sources operate with different periods. 相似文献
6.
7.
XIAN He-qun FENG Deng-guo 《通讯和计算机》2007,4(3):44-51
Even with attractive computational advantages, mobile agent technology has not developed its full potential due to various security issues. This paper proposes a method called Private Key Consignment to solve the problem of how to protect the data carried by mobile agents. It exploits new functionalities and mechanism provided by the trusted computing technology, and adopts both public key and symmetric key cryptographic means for data and key protection. The most notable feature of this method is that it protects the private key of the agent by consigning it to a tamper proof hardware, thus, enabling convenient and secure use of the private key. It provides a new scheme of mobile agents' data protection. 相似文献
8.
Chih-Hung Wang Author Vitae Chih-Heng Yin Author Vitae Author Vitae 《Computers & Electrical Engineering》2006,32(5):364-375
The most efficient approach to a fair exchange is to use an off-line trusted third party (TTP for short) who gets involved only when a dispute between two parties occurs. However, exchanged secrets that are not protected properly may be exposed to the TTP when one of these two parties asks the TTP to mediate the dispute. The first work to protect exchanged secrets from TTP’s misuse was proposed by Franklin and Reiter in 1997. They provided an on-line semi-trusted third party instead of an off-line third party for a fair exchange. Their schemes forced the TTP to take part in the protocol for all the cases, and thus, deemed to be impractical.The present paper, introduces several models, including single and multiple TTPs, to focus the attention not only on security properties, but also on reliability functions. In the single TTP mode, our new scheme can protect the exchanged data through an efficient exchange protocol, whereas in the multiple TTP mode, we proposed an approach to balance the security level with the reliability of the system. 相似文献
9.
随着增强现实技术和基于位置服务(LBS)技术的发展,增强现实的应用也越来越广泛,LBS是增强现实的一个重要应用,用户位置隐私的泄漏是LBS用户的重要威胁,因此对用户位置隐私的管理就显得非常重要。论文首先分析用户位置隐私保护的重要性,接着介绍用户位置隐私泄露的类型,并分析和比较目前已有的用户位置隐私保护方法的优缺点,最后提出含有集中受信任的第三方模型的用户位置隐私保护方法,该方法优化了现有的用户位置隐私保护方法,可以有效地实现用户位置隐私的保护。 相似文献
10.