全文获取类型
收费全文 | 122篇 |
免费 | 6篇 |
专业分类
公路运输 | 23篇 |
综合类 | 48篇 |
水路运输 | 20篇 |
铁路运输 | 33篇 |
综合运输 | 4篇 |
出版年
2023年 | 3篇 |
2021年 | 4篇 |
2020年 | 5篇 |
2019年 | 3篇 |
2016年 | 1篇 |
2015年 | 1篇 |
2014年 | 4篇 |
2013年 | 7篇 |
2012年 | 6篇 |
2011年 | 4篇 |
2010年 | 5篇 |
2009年 | 10篇 |
2008年 | 12篇 |
2007年 | 13篇 |
2006年 | 9篇 |
2005年 | 6篇 |
2004年 | 4篇 |
2003年 | 2篇 |
2002年 | 11篇 |
2001年 | 9篇 |
2000年 | 2篇 |
1997年 | 2篇 |
1993年 | 3篇 |
1992年 | 1篇 |
1990年 | 1篇 |
排序方式: 共有128条查询结果,搜索用时 194 毫秒
61.
62.
提出了在AdHoe网络中一种分布式基于身份的密钥管理及认证方法。每个节点使用其身份作为公钥,主密钥由各节点的私钥分享,从而形成基于身份的门限分布式密钥管理。该方法不仅提供了点对点的认证,而且节省了网络带宽和节点的能量消耗,具有很高的效率和鲁棒性。 相似文献
63.
64.
65.
This paper proposes an identity-based encryption scheme with the help of bilinear pairings, where the identity information of a user functions as the user's public key. The advantage of an identity-based public key system is that it can avoid public key certificates and certificate management. Our identity-based encryption scheme enjoys short ciphertexts and provable security against chosen-ciphertext attack (CCA). 相似文献
66.
This paper proposes an adaptively secure solution to certificateless distributed key encapsulation mechanism from pairings by using Canetti's adaptive secure key generation scheme based on discrete logarithm. The proposed scheme can withstand adaptive attackers that can choose players for corruption at any time during the run of the protocol, and this kind of attack is powerful and realistic. In contrast, all previously presented threshold certificateless public key cryptosystems are proven secure against the more idealized static adversaries only. They choose and fix the subset of target players before running the protocol. We also prove security of this scheme in the random oracle model. 相似文献
67.
Formal analysis of authentication in 802.11i 总被引:1,自引:0,他引:1
Authentication is the basis of the security of IEEE 802.11i standard. The authentication process in 802.11i involves two important protocols: a 4-way handshake and a group key handshake. A formal analysis of authentication in 802.11i is given via a belief multisets formalism. The analysis shows that the 4-way handshake and the group key handshake may provide satisfactory mutual authentication, key management, and issue of a new group temporal key from an access point to a user device, under the guarantee of mutual possession of a confidential pairwise master key. The analysis also shows that there exists a denial of service attack in the 4-way handshake and some seeming redundancies are useful in the protocol implementation. 相似文献
68.
A new group key management scheme against the unreliable wireless communication channel and unsafe environment was proposed for wireless sensor network (WSN). In the proposed scheme, broadcast polynomial, generated over finite field Fq based on the secret sharing, was employed to revoke compromised sensor nodes. In order to tolerate key-update message loss, group session keys were generated as one-way hash chain sequence and distributed in advance. The analysis showes that the scheme has better performance in terms of the computation and communication overhead. 相似文献
69.
70.
毛卿 《郑州铁路职业技术学院学报》2007,19(3):8-9,12
1 APN的体系结构组成一个完整的APN系统由以下部分组成:APN VDNServer,APN通讯网关、密钥管理、防火墙。1.1 APN体系VDN服务——每个APN在因特网上会属于一个虚拟的域,有自己独特的虚拟域名和虚拟主机名。同时,在Internet上,开发出一种机制来解析这些域名,使得在同一个域之间的 相似文献