نتایج جستجو برای: unsecured existence

تعداد نتایج: 179118  

2004
Li Gan Tarun Sabarwal

A test of adverse events and strategic timing theories can be conducted by determining whether some relevant financial decision variables, such as financial benefit from filing for bankruptcy, or debt discharged in bankruptcy are endogenous with the bankruptcy decision or not. For the strategic timing theory such decisions are endogenous, while for the adverse events theory they are not. Hausma...

2014
Quist-aphetsi Kester Laurent Nana Anca Christine Pascu Sophie Gire Jojo M. Eghan Nii Narku Quaynor Musheer Ahmad Sajal K. Das Krishna Kant Minglei Zha Bin Wang

The high increase in the transmission of digital data over secured and unsecured communications channels poses a lot of security and privacy concerns to both the transmitter and the receiver. Many operations engaged today in urban and warfare, be they for construction, monitory of plants, high voltage lines, military, police, fire service, intelligence etc. engages the use of surveillance syste...

2016
Federico Giri

The aim of this paper is to assess the impact of the interbank market on the business cycle. To do that, we built a DSGE model with heterogeneous households and banks. Net lender banks can allocate their resources between interbank lending and risk free government bonds. This portfolio choice is affected by an exogenous counterpart risk shock on the interbank market. An increase of the counterp...

2015
Nishakumari Ashokkumar Lodha Dipali Sakharam Patil

Mobile Ad Hoc Network (MANETs) consists of a collection of mobile nodes which can move freely. These nodes have characteristic that they can be dynamically selforganized into arbitrary topology networks without a fixed infrastructure. MANETs are highly dynamic network because nodes may join and leave the network at any time. NCPR significantly reduce the routing overhead in the MANET. Once the ...

2012
Costas Azariadis Leo Kaas

This paper argues that self-fulfilling beliefs in credit conditions can generate endogenously persistent business cycle dynamics. We develop a tractable dynamic general equilibrium model with idiosyncratic firm productivity shocks. Capital from less productive firms is lent to more productive ones in the form of credit secured by collateral and also as unsecured credit based on reputation. A dy...

2004
S. Weiler

As the DNS Security (DNSSEC) specifications have evolved, the syntax and semantics of the DNSSEC resource records (RRs) have changed. Many deployed nameservers understand variants of these semantics. Dangerous interactions can occur when a resolver that understands an earlier version of these semantics queries an authoritative server that understands the new delegation signer semantics, includi...

2009
Jie Zhang Lyn C Thomas

Estimating Recovery Rate and Recovery Amount has taken a more importance in consumer credit because of both the new Basel Accord regulation and the increase in number of defaulters due to the recession. We examine whether it is better to estimate Recovery Rate (RR) or Recovery amounts. We use linear regression and survival analysis models to model Recovery rate and Recovery amount, thus to pred...

2003
Xinhua Zhang Alexandre Dulaunoy Christoph Meinel

As an open source project, Open Simple Secure Transaction (OpenSST) protocol aims to be a secure and transactionoriented protocol for the unsecured network. At present a prototypes has been implemented. In this paper, we give firstly an overview of OpenSST, and then we describe the key store and authentication mechanism of the prototype, as well as make an analysis on its security. Then we intr...

Journal: :Physical review letters 2010
Nicolas Gisin Stefano Pironio Nicolas Sangouard

In device-independent quantum key distribution (DIQKD), the violation of a Bell inequality is exploited to establish a shared key that is secure independently of the internal workings of the QKD devices. An experimental implementation of DIQKD, however, is still awaited, since hitherto all optical Bell tests are subject to the detection loophole, making the protocol unsecured. In particular, ph...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید