首页 | 官方网站   微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   555篇
  免费   112篇
  国内免费   84篇
工业技术   751篇
  2023年   1篇
  2022年   5篇
  2021年   7篇
  2020年   4篇
  2019年   12篇
  2018年   10篇
  2017年   7篇
  2016年   18篇
  2015年   23篇
  2014年   43篇
  2013年   44篇
  2012年   63篇
  2011年   82篇
  2010年   59篇
  2009年   66篇
  2008年   57篇
  2007年   63篇
  2006年   55篇
  2005年   21篇
  2004年   15篇
  2003年   7篇
  2002年   11篇
  2001年   4篇
  2000年   6篇
  1999年   1篇
  1998年   6篇
  1997年   4篇
  1996年   3篇
  1995年   4篇
  1994年   1篇
  1993年   7篇
  1992年   4篇
  1991年   4篇
  1990年   1篇
  1989年   1篇
  1988年   5篇
  1987年   4篇
  1986年   4篇
  1985年   3篇
  1984年   2篇
  1983年   4篇
  1982年   1篇
  1981年   2篇
  1980年   1篇
  1979年   3篇
  1978年   2篇
  1976年   1篇
排序方式: 共有751条查询结果,搜索用时 0 毫秒
1.
This paper proposes an identity-based threshold decryption scheme IB-ThDec and reduces its security to the Bilinear Diffie-Hellman problem. Compared with previous work, this conceals two pairing computations in the ciphertext validity verification procedure. The formal proof of security of this scheme is provided in the random oracle model. Additionally, we show that IB-ThDec can be applied to the threshold key escrow and the mediated cryptosystems.  相似文献   
2.
Explicit equations are given for the moduli space of framed instantons as a quasi-affine variety, based on the representation theory of noncommutative power series, or equivalently, the minimal realization theory of bilinear systems.  相似文献   
3.
文章对OA系统中存在的安全问题进行了讨论,引人了一种新的基于远程匿名身份认证EPID模式,它能通过保存设备拥有者私密信息的硬件设施进行身份鉴定。一个嵌入EPID私密的硬件设备可以向远程机构证实它的有效性,而不必暴露自己的身份和其他私密信息。可以撤消一个签名的EPID私钥,即使不知道密钥的身份。同时,把EPID和其它的一些方法进行了对比。  相似文献   
4.
Abstract. In this paper we define subset bilinear time series models, and then describe an algorithm for the estimation of these models. It is also pointed out that for this class of non-linear time series models, it is possible to obtain optimal several step predictors. The estimation technique of these models is illustrated with respect to three time series, and the optimal several steps ahead forecasts of these time series models are calculated. A comparison of these forecasts is made with the forecasts obtained by the best linear autoregressive and threshold autoregressive models. The residuals obtained from the models are tested for independence and Gaussianity using higher order moments.  相似文献   
5.
为了能在有限资源的无线传感器网络上进行安全的匿名通信,使用双线性函数的双线性对和异或运算提出了一种匿名安全路由协议,与目前现有的无线网络匿名通信方案相比,协议不仅能提供身份的机密性、位置隐私性和路由的匿名性,而且还满足前向和后向安全性,并且大大提高了系统的计算复杂度和带宽消耗,更适合无线传感器网络。  相似文献   
6.
在有些情况下, 需要将验证者限定为某一个人。 利用基于身份的密码体制, 提出了一种强指定验证人签名和一种强指定验证人多重代理签名, 并对其安全性进行了分析。 在签名代价和验证代价上, 提出的强指定验证人签名比Kang等人的方案要低。提出的强指定验证人多重代理签名可以同时授权给n个代理人, 可以有效防止代理签名人对签名权的滥用。  相似文献   
7.
In this paper,we use elliptic nets to implement the optimized Ate pairings and optimal pairings on the Barreto-Naehrig curves with embedding degree 12.In order to do the arithmetic of elliptic curves over finite fields with elliptic nets,we first give some basic properties of elliptic nets associated to elliptic curves over finite fields and the expression of Miller function in terms of elliptic nets.Then we give formulae to compute some optimized pairings with elliptic nets,which is a new method to implement pairings.This method with elliptic nets has time complexity comparable to Miller’s algorithm and it can be optimized.  相似文献   
8.
该方案是门限代理多重签名与盲签名的有机集成 ,既解决了代理签名方案中代理签名人权利过于集中的问题 ,又通过盲签名实现了签名的匿名性和不可追踪性。在该数字签名方案的基础上 ,采用双线性对的签名和验证方式 ,提出了基于双线性对的门限代理盲多重签名方案 ,极大地提高了门限代理盲多重签名的安全性和实现速度。  相似文献   
9.
This paper studies the controllability of a class of time‐invariant discrete‐time bilinear systems. Although the system is not controllable in the whole space, there is a very large region where control is effective. Results show that the uncontrollable region of this kind of bilinear system has a Lebesgue measure of zero. In other words, for almost any initial state and any terminal state in the state space, the former can be transferred to the latter. Further, a necessary condition for near controllability is presented. Therefore, the results in this paper unify and generalize the corresponding conclusions in the literature. ©2014 Chinese Automatic Control Society and Wiley Publishing Asia Pty Ltd  相似文献   
10.
Directed signature scheme allows only a designated verifier to check the validity of the signature issued to him; and at the time of trouble or if necessary, any third party can verify the signature with the help of the signer or the designated verifier as well. Due to its merits, directed signature scheme is widely used in situations where the receiver’s privacy should be protected. Threshold directed signature is an extension of the standard directed signature, in which several signers may be required to cooperatively sign messages for sharing the responsibility and authority. To the best of our knowledge, threshold directed signature has not been well studied till now. Therefore, in this paper, we would like to formalize the threshold directed signature and its security model, then present a new (tn) threshold directed signature scheme from bilinear pairings and use the techniques from provable security to analyze its security.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号