Application of Electronic Documents to Container Rail- Water Intermodal Transportation

ICTE 2013 ◽  
2013 ◽  
Author(s):  
Ke Cao ◽  
Hongxia Lv ◽  
Simin Wang
2016 ◽  
Author(s):  
Marc-Aurele Racicot

These days, is there a topic more significant and provocative than the protection of privacy in the private sector? The importance of this topic has been highlighted since the Canadian Parliament adopted the Personal Information Protection and Electronic Documents Act which came into full force on 1 January 2004 and which is scheduled for review in 2006. Although it seems that everywhere we turn, the word "privacy" and its companion PIPEDA are at centre stage, many say that this attention is unwarranted and a knee-jerk reaction to the information age where one can run but cannot hide. Like it or not, we are subject to the prying eyes of cameras in public places, the tracking and trailing of Internet activities, the selling of address lists and other such listings, and the synthesizing by marketers of frightful amounts of personal information that, when pulled together, reveals a lot about our personal life, our ancestry, our relationships, our interests and our spending habits.


2021 ◽  
Vol 13 (11) ◽  
pp. 5907
Author(s):  
Marta Gonzalez-Aregall ◽  
Kevin Cullinane ◽  
Inge Vierth

This study analyses how port governance systems in Europe have influenced the implementation of port initiatives focused on promoting modal shifts in freight transportation. Through a comprehensive review of port strategies, this research identified 49 individual modal shift initiatives among 21 port authorities in Europe. The results show that ports located in the Northern regions and managed by local governments, particularly in Belgium and the Netherlands, are leaders in executing strategies for modal shifts in freight transportation. Technological solutions and promoting intermodal transportation were found to be the most popular initiatives used to promote hinterland movements of freight by rail and waterborne transportation.


2013 ◽  
Vol 385-386 ◽  
pp. 1705-1707
Author(s):  
Tzer Long Chen ◽  
Yu Fang Chung ◽  
Jian Mao Hong ◽  
Jeng Hong Jhong ◽  
Chin Sheng Chen ◽  
...  

It is important to notice that the access control mechanism has been widely applied in various areas, such as on-line video systems, wireless network, and electronic documents. We propose an access control mechanism which is constructed based on two mathematical fundamentals: Lagrange interpolation and ElGamal algorithm. We conduct performance analysis to compare the efficiency of our proposed scheme with that of several related published schemes in both key generation phase and key derivation phase. Our new scheme is proven to be more efficient. It is shown, as expected, a more efficient scheme provides relatively less security and a more secure scheme is relatively less efficient for private keys of the same size.


Sign in / Sign up

Export Citation Format

Share Document