Results 71 to 80 of about 3,103,043 (192)

Transport properties in Simplified Double Exchange model

open access: yes, 2003
Transport properties of the manganites by the double-exchange mechanism are considered. The system is modeled by a simplified double-exchange model, i.e.
Coery J. M. D.   +5 more
core   +1 more source

Growth, profitability and savings of quoted public limited companies 1964-70 [PDF]

open access: yes, 1973
This study by extending an earlier study by Haq and Baqai (1967) on growth, profitability and savings of companies quoted on the Karachi Stock Exchange analysis movements of these key variables and identifies key factors and events which explain them for
Amjad, Rashid
core  

Fixing for your life [PDF]

open access: yes
The Asian crisis took place against a background of exchange rate regimes that were characterized as soft pegs. This has led many analysts to conclude that “the peg did it” and that emerging markets (EMs) should “just say no” to pegged exchange rates. We
Calvo, Guillermo, Reinhart, Carmen
core   +4 more sources

Coded Cooperative Data Exchange for a Secret Key

open access: yes, 2014
We consider a coded cooperative data exchange problem with the goal of generating a secret key. Specifically, we investigate the number of public transmissions required for a set of clients to agree on a secret key with probability one, subject to the ...
Courtade, Thomas A., Halford, Thomas R.
core   +1 more source

Predicate-Based Key Exchange [PDF]

open access: yes, 2010
We provide the first description of and security model for authenticated key exchange protocols with predicate-based authentication. In addition to the standard goal of session key security, our security model also provides for credential privacy: a participating party learns nothing more about the other party's credentials than whether they satisfy ...
Birkett, James, Stebila, Douglas
openaire   +2 more sources

PDAKE: A Provably Secure PUF-Based Device Authenticated Key Exchange in Cloud Setting

open access: yesIEEE Access, 2019
In this paper, we study on how to construct an authenticated key exchange protocol in a device based authentication setting where an user who has a PUF-based device and its multi-factor authenticators desires to mutually authenticate a server. Generally,
Jin Wook Byun
doaj   +1 more source

Deniable Internet Key Exchange [PDF]

open access: yes, 2010
In this work, we develop a family of non-malleable and deniable Diffie-Hellman key-exchange (DHKE) protocols, named deniable Internet keyexchange (DIKE). The newly developed DIKE protocols are of conceptual clarity, provide much remarkable privacy protection to protocol participants, and are of highly practical (online) efficiency.
Andrew C. Yao, Yunlei Zhao
openaire   +1 more source

Does trade integration alter monetary policy transmission? [PDF]

open access: yes, 2008
This paper explores the role of trade integration—or openness—for monetary policy transmission in a medium-scale New Keynesian model. Allowing for strategic complementarities in price-setting, we highlight a new dimension of the exchange rate channel by ...
Cwik, Tobias J.   +2 more
core  

On a new fast public key cryptosystem [PDF]

open access: yes, 2015
This paper presents a new fast public key cryptosystem namely : a key exchange algorithm, a public key encryption algorithm and a digital signature algorithm, based on the difficulty to invert the following function : $F(x) =(a\times x)Mod(2^p)Div(2^q)$
Bouftass, Samir
core  

Home - About - Disclaimer - Privacy