Results 11 to 20 of about 6,315,248 (307)

Information Asymmetry, Financialisation and Financial Access [PDF]

open access: yesSSRN Electronic Journal, 2018
AbstractThis study investigates whether information sharing channels that are meant to reduce information asymmetry have led to an increase in financial access. The study employs a Generalized Method of Moments technique using data from 53 African countries during the period from 2004 to 2011 to examine this linkage.
Simplice A. Asongu, Nicholas M. Odhiambo
openaire   +2 more sources

Improved Differential Fault Attack on LEA by Algebraic Representation of Modular Addition

open access: yesIEEE Access, 2020
Recently, as the number of IoT (Internet of Things) devices has increased, the use of lightweight cryptographic algorithms that are suitable for environments with scarce resources has also increased.
Seonghyuck Lim   +2 more
doaj   +1 more source

Efficient Parallel Implementation of CTR Mode of ARX-Based Block Ciphers on ARMv8 Microcontrollers

open access: yesApplied Sciences, 2021
With the advancement of 5G mobile telecommunication, various IoT (Internet of Things) devices communicate massive amounts of data by being connected to wireless networks.
JinGyo Song, Seog Chung Seo
doaj   +1 more source

Efficient Implementation of AES and CTR_DRBG on 8-Bit AVR-Based Sensor Nodes

open access: yesIEEE Access, 2021
Since Rijndael algorithm was selected as the Advanced Encryption Standard (AES) by NIST, optimization research for the AES has been actively conducted on various IoT-based processors.
Youngbeom Kim, Seog Chung Seo
doaj   +1 more source

Discovering the Trading Pattern of Financial Market Participants: Comparison of Two Co-Clustering Methods

open access: yesIEEE Access, 2018
Co-clustering is rapidly becoming a powerful data analysis technique in varied fields, such as gene expression analysis, data and web mining, and market baskets analysis.
Guangwei Shi   +5 more
doaj   +1 more source

Optimization of PBKDF2 Using HMAC-SHA2 and HMAC-LSH Families in CPU Environment

open access: yesIEEE Access, 2021
Password-Based Key Derivation Function 2 (PBKDF2) is widely used cryptographic algorithm in order to generate secure keys to a password in various occasions. For example, it is used for file encryption and implementation of authentication systems, and so
Hojin Choi, Seog Chung Seo
doaj   +1 more source

FINANCIAL INFORMATION, EFFECTS OF FINANCIAL INFORMATION ON ECONOMIC DECISION [PDF]

open access: yesAnalele Universităţii Constantin Brâncuşi din Târgu Jiu : Seria Economie, 2010
Financial information has, indisputably, an important effect in economics. To form an effective capital market, financial information must be reliable and accurate. Misleading financial information always has a negative impact on economic decision taken by users.
Valentin Ioan UŞURELU   +3 more
openaire   +3 more sources

Forecasting Stock Prices of Companies Producing Solar Panels Using Machine Learning Methods

open access: yesComplexity, 2022
Solar energy has become an integral part of the economy of developed countries, so it is important to monitor the pace of its development, prospects, as well as the largest companies that produce solar panels since the supply of solar energy in a ...
Zaffar A. Shaikh   +3 more
doaj   +1 more source

Fast Implementation of SHA-3 in GPU Environment

open access: yesIEEE Access, 2021
Recently, Graphic Processing Units (GPUs) have been widely used for general purpose applications such as machine learning applications, acceleration of cryptographic applications (especially, blockchains), etc.
Hojin Choi, Seog Chung Seo
doaj   +1 more source

Recoverable Random Numbers in an Internet of Things Operating System

open access: yesEntropy, 2017
Over the past decade, several security issues with Linux Random Number Generator (LRNG) on PCs and Androids have emerged. The main problem involves the process of entropy harvesting, particularly at boot time.
Taeill Yoo, Ju-Sung Kang, Yongjin Yeom
doaj   +1 more source

Home - About - Disclaimer - Privacy