首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   3篇
  免费   0篇
综合类   1篇
水路运输   2篇
  2014年   1篇
  2013年   1篇
  2000年   1篇
排序方式: 共有3条查询结果,搜索用时 0 毫秒
1
1.
The impact of higher container stacking on yard operations has been treated as one of the major factors influencing the efficiency of terminal operations. For terminal operators who have to increase their storage capacity by way of higher container stacking, the consequences must be carefully measured. This paper examines the unproductive container movements undertaken in one high throughput terminal with high land productivity, and provides an example of how terminal operator handles the yard operations and the possible impact on areas of operation.  相似文献   
2.
The impact of higher container stacking on yard operations has been treated as one of the major factors influencing the efficiency of terminal operations. For terminal operators who have to increase their storage capacity by way of higher container stacking, the consequences must be carefully measured. This paper examines the unproductive container movements undertaken in one high throughput terminal with high land productivity, and provides an example of how terminal operator handles the yard operations and the possible impact on areas of operation.  相似文献   
3.
In the Internet or cloud computing environments, service providers provide more and more content services. Users can use these convenient content services in daily life. The major data of the user are maintained by the service providers except that some personal privacy data are stored at the client device. An attacker may try to invade the systems, and it will cause the damage of users and service providers. Also, users may lose their mobile devices and then it may cause the data disclosure problem. As a result, the data and privacy protection of users become an important issue in these environments. Besides, since many mobile devices are used in these environments, secure authentication and data protection methods must be efficient in these low resource environments. In this paper, we propose an efficient and privacy protection digital rights management (DRM) scheme that users can verify the valid service servers and the service servers can ensure the legal users. Since the key delegation center of the third party has the robust security protection, our proposed scheme stores the encrypted secret keys in the key delegation center. This approach not only can reduce the storage space of the user devices, but also can recover the encrypted secret keys in the key delegation center when a user loses her/his devices for solving the device losing problem.  相似文献   
1
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号