全文获取类型
收费全文 | 165篇 |
免费 | 8篇 |
专业分类
公路运输 | 34篇 |
综合类 | 37篇 |
水路运输 | 62篇 |
铁路运输 | 22篇 |
综合运输 | 18篇 |
出版年
2021年 | 5篇 |
2020年 | 2篇 |
2019年 | 1篇 |
2018年 | 3篇 |
2017年 | 2篇 |
2016年 | 1篇 |
2015年 | 6篇 |
2014年 | 4篇 |
2013年 | 10篇 |
2012年 | 13篇 |
2011年 | 13篇 |
2010年 | 6篇 |
2009年 | 12篇 |
2008年 | 12篇 |
2007年 | 22篇 |
2006年 | 12篇 |
2005年 | 10篇 |
2004年 | 3篇 |
2003年 | 4篇 |
2002年 | 2篇 |
2001年 | 4篇 |
2000年 | 2篇 |
1999年 | 3篇 |
1998年 | 4篇 |
1997年 | 3篇 |
1996年 | 4篇 |
1994年 | 5篇 |
1993年 | 2篇 |
1986年 | 1篇 |
1985年 | 1篇 |
1984年 | 1篇 |
排序方式: 共有173条查询结果,搜索用时 196 毫秒
171.
An artificial immunity based multimodal evolution algorithm is developed to generate detectors with variable coverage for multidimensional intrusion detection. In this algorithm, a proper fitness function is used to drive the detectors to fill in those detection holes close to self set or among self spheres, and genetic algorithm is adopted to reduce the negative effects that different distribution of self imposes on the detector generating process. The validity of the algorithm is tested with spherical and rectangular detectors, respectively, and experiments performed on two real data sets (machine learning database and DAPRA99) indicate that the proposed algorithm can obtain good results on spherical detectors, and that its performances in detection rate, false alarm rate, stabih'ty, time cost, and adaptability to incomplete training set on spherical detectors are all better than on rectangular ones. 相似文献
172.
Parallel Key-insulated Signature: Framework and Construction 总被引:1,自引:0,他引:1
To deal with the key-exposure problem in signature systems, a new framework named parallel key-insulated signature (PKIS) was introduced, and a concrete PKIS scheme was proposed. Compared with traditional key-insulated signature (KIS) schemes, the proposed PKIS scheme allows a frequent updating for temporary secret keys without increasing the risk of helper key-exposure. Moreover, the proposed PKIS scheme does not collapse even if some (not all) of the helper keys and some of the temporary secret keys are simultaneously exposed. As a result, the security of the PKIS scheme is greatly enhanced, and the damage caused by key-exposure is successfully minimized. 相似文献
173.
In proxy signature schemes, an original signer A delegates its signing capability to a proxy signer B, in such a way that B can sign message on behalf of A.The recipient of the final message verifies at the same time that B computes the signature and that A has delegated its signing capability to B.Recently many identity-based(ID-based) proxy signature schemes have been proposed, however, the problem of key escrow is inherent in this setting.Certificateless cryptography can overcome the key escrow problem.In this paper, we present a general security model for certificateless proxy signature scheme.Then, we give a method to construct a secure certificateless proxy scheme from a secure certificateless signature scheme, and prove that the security of the construction can be reduced to the security of the original certificateless signature scheme. 相似文献