首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   165篇
  免费   8篇
公路运输   34篇
综合类   37篇
水路运输   62篇
铁路运输   22篇
综合运输   18篇
  2021年   5篇
  2020年   2篇
  2019年   1篇
  2018年   3篇
  2017年   2篇
  2016年   1篇
  2015年   6篇
  2014年   4篇
  2013年   10篇
  2012年   13篇
  2011年   13篇
  2010年   6篇
  2009年   12篇
  2008年   12篇
  2007年   22篇
  2006年   12篇
  2005年   10篇
  2004年   3篇
  2003年   4篇
  2002年   2篇
  2001年   4篇
  2000年   2篇
  1999年   3篇
  1998年   4篇
  1997年   3篇
  1996年   4篇
  1994年   5篇
  1993年   2篇
  1986年   1篇
  1985年   1篇
  1984年   1篇
排序方式: 共有173条查询结果,搜索用时 196 毫秒
171.
An artificial immunity based multimodal evolution algorithm is developed to generate detectors with variable coverage for multidimensional intrusion detection. In this algorithm, a proper fitness function is used to drive the detectors to fill in those detection holes close to self set or among self spheres, and genetic algorithm is adopted to reduce the negative effects that different distribution of self imposes on the detector generating process. The validity of the algorithm is tested with spherical and rectangular detectors, respectively, and experiments performed on two real data sets (machine learning database and DAPRA99) indicate that the proposed algorithm can obtain good results on spherical detectors, and that its performances in detection rate, false alarm rate, stabih'ty, time cost, and adaptability to incomplete training set on spherical detectors are all better than on rectangular ones.  相似文献   
172.
Parallel Key-insulated Signature: Framework and Construction   总被引:1,自引:0,他引:1  
To deal with the key-exposure problem in signature systems, a new framework named parallel key-insulated signature (PKIS) was introduced, and a concrete PKIS scheme was proposed. Compared with traditional key-insulated signature (KIS) schemes, the proposed PKIS scheme allows a frequent updating for temporary secret keys without increasing the risk of helper key-exposure. Moreover, the proposed PKIS scheme does not collapse even if some (not all) of the helper keys and some of the temporary secret keys are simultaneously exposed. As a result, the security of the PKIS scheme is greatly enhanced, and the damage caused by key-exposure is successfully minimized.  相似文献   
173.
In proxy signature schemes, an original signer A delegates its signing capability to a proxy signer B, in such a way that B can sign message on behalf of A.The recipient of the final message verifies at the same time that B computes the signature and that A has delegated its signing capability to B.Recently many identity-based(ID-based) proxy signature schemes have been proposed, however, the problem of key escrow is inherent in this setting.Certificateless cryptography can overcome the key escrow problem.In this paper, we present a general security model for certificateless proxy signature scheme.Then, we give a method to construct a secure certificateless proxy scheme from a secure certificateless signature scheme, and prove that the security of the construction can be reduced to the security of the original certificateless signature scheme.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号