首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   138篇
  免费   5篇
公路运输   25篇
综合类   69篇
水路运输   17篇
铁路运输   31篇
综合运输   1篇
  2022年   4篇
  2021年   2篇
  2020年   4篇
  2019年   6篇
  2018年   3篇
  2017年   3篇
  2016年   1篇
  2015年   11篇
  2014年   5篇
  2013年   7篇
  2012年   11篇
  2011年   7篇
  2010年   19篇
  2009年   9篇
  2008年   11篇
  2007年   16篇
  2006年   8篇
  2005年   6篇
  2004年   1篇
  2003年   5篇
  2002年   3篇
  2001年   1篇
排序方式: 共有143条查询结果,搜索用时 46 毫秒
141.
A Cramer-Shoup scheme was modified in a variant way.The major advantage with respect to Kurosawa-Desmedt scheme is that it saves a key parameter and produces shorter ciphertext.The proof of security shows that our scheme can be instantiated with any computational secure key derivation and message authentication functions.Thus it extends the applicability of the Kurosawa-Desmedt scheme and improves its effciency.  相似文献   
142.
This study investigates potential port users’ surplus and terminal operators’ profits due to transforming port governance from the ‘tool port’ model to the ‘landlord port’ model. Although the landlord port model is one of the most adopted and successful port governance models, many ports still operate under other models. Chittagong Port, the largest port in Bangladesh, currently operates under the tool port model, while the country’s second-largest port, Mongla Port, operates under the service port model. Chittagong Port is currently facing many challenges, including capacity expansion and renovation of port facilities. Therefore, we form four hypothetical situations for port governance model transformation, assuming that Chittagong Port will transform to the landlord port model but that Mongla Port will run under the existing governance model. Estimating a Bertrand game model, we present a cost-benefit analysis for port users and terminal operators (or port authorities) in hypothetical game situations. The results reveal that privatising one of the container terminals under a landlord setting is the most profitable scenario for Chittagong Port Authority, but privatising all terminals of Chittagong Port yields the highest users’ surplus. However, privatising two of the terminals while they cooperate yields the lowest users’ surplus.  相似文献   
143.
A new efficient protocol-proving algorithm was proposed for verifying security protocols. This algorithm is based on the improved authentication tests model, which enhances the original model by formalizing the message reply attack. With exact causal dependency relations between messages in this model, the protocol-proving algorithm can avoid the state explosion caused by asynchronous. In order to get the straight proof of security protocols, three authentication theorems are exploited for evaluating the agreement and distinction properties. When the algorithm terminates, it outputs either the proof results or the potential flaws of the security protocol. The experiment shows that the protocol-proving algorithm can detect the type flaw attack on Neuman-Stubblebine protocol, and prove the correctness of NSL protocol by exploring only 10 states.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号