Results 71 to 80 of about 3,103,043 (192)
Transport properties in Simplified Double Exchange model
Transport properties of the manganites by the double-exchange mechanism are considered. The system is modeled by a simplified double-exchange model, i.e.
Coery J. M. D. +5 more
core +1 more source
Growth, profitability and savings of quoted public limited companies 1964-70 [PDF]
This study by extending an earlier study by Haq and Baqai (1967) on growth, profitability and savings of companies quoted on the Karachi Stock Exchange analysis movements of these key variables and identifies key factors and events which explain them for
Amjad, Rashid
core
The Asian crisis took place against a background of exchange rate regimes that were characterized as soft pegs. This has led many analysts to conclude that “the peg did it” and that emerging markets (EMs) should “just say no” to pegged exchange rates. We
Calvo, Guillermo, Reinhart, Carmen
core +4 more sources
Coded Cooperative Data Exchange for a Secret Key
We consider a coded cooperative data exchange problem with the goal of generating a secret key. Specifically, we investigate the number of public transmissions required for a set of clients to agree on a secret key with probability one, subject to the ...
Courtade, Thomas A., Halford, Thomas R.
core +1 more source
Predicate-Based Key Exchange [PDF]
We provide the first description of and security model for authenticated key exchange protocols with predicate-based authentication. In addition to the standard goal of session key security, our security model also provides for credential privacy: a participating party learns nothing more about the other party's credentials than whether they satisfy ...
Birkett, James, Stebila, Douglas
openaire +2 more sources
PDAKE: A Provably Secure PUF-Based Device Authenticated Key Exchange in Cloud Setting
In this paper, we study on how to construct an authenticated key exchange protocol in a device based authentication setting where an user who has a PUF-based device and its multi-factor authenticators desires to mutually authenticate a server. Generally,
Jin Wook Byun
doaj +1 more source
Deniable Internet Key Exchange [PDF]
In this work, we develop a family of non-malleable and deniable Diffie-Hellman key-exchange (DHKE) protocols, named deniable Internet keyexchange (DIKE). The newly developed DIKE protocols are of conceptual clarity, provide much remarkable privacy protection to protocol participants, and are of highly practical (online) efficiency.
Andrew C. Yao, Yunlei Zhao
openaire +1 more source
A secure and efficient authenticated key exchange scheme for smart grid. [PDF]
Xia Z, Liu T, Wang J, Chen S.
europepmc +1 more source
Does trade integration alter monetary policy transmission? [PDF]
This paper explores the role of trade integration—or openness—for monetary policy transmission in a medium-scale New Keynesian model. Allowing for strategic complementarities in price-setting, we highlight a new dimension of the exchange rate channel by ...
Cwik, Tobias J. +2 more
core
On a new fast public key cryptosystem [PDF]
This paper presents a new fast public key cryptosystem namely : a key exchange algorithm, a public key encryption algorithm and a digital signature algorithm, based on the difficulty to invert the following function : $F(x) =(a\times x)Mod(2^p)Div(2^q)$
Bouftass, Samir
core

