Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "derivative security"
@article{DBLP:journals/jap/SiuZY19, author = {Tak Kuen Siu and Jinxia Zhu and Hailiang Yang}, title = {A martingale approach for asset allocation with derivative security and hidden economic risk}, journal = {J. Appl. Probab.}, volume = {56}, number = {3}, pages = {723--749}, year = {2019}, url = {https://doi.org/10.1017/jpr.2019.40}, doi = {10.1017/JPR.2019.40}, timestamp = {Thu, 16 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jap/SiuZY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aina/HajatiCSZG19, author = {Farshid Hajati and Ali Cheraghian and Omid Ameri Sianaki and Behnam Zeinali and Soheila Gheisari}, editor = {Leonard Barolli and Makoto Takizawa and Fatos Xhafa and Tomoya Enokido}, title = {Polar Topographic Derivatives for 3D Face Recognition: Application to Internet of Things Security}, booktitle = {Web, Artificial Intelligence and Network Applications - Proceedings of the Workshops of the 33rd International Conference on Advanced Information Networking and Applications, {AINA} Workshops 2019, Matsue, Japan, March 27-29, 2019}, series = {Advances in Intelligent Systems and Computing}, volume = {927}, pages = {936--945}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-15035-8\_92}, doi = {10.1007/978-3-030-15035-8\_92}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/aina/HajatiCSZG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/dnb/Pfoh13, author = {Jonas Pfoh}, title = {Leveraging derivative virtual machine introspection methods for security applications}, school = {Technical University Munich}, year = {2013}, url = {https://nbn-resolving.org/urn:nbn:de:bvb:91-diss-20130318-1115811-0-5}, urn = {urn:nbn:de:bvb:91-diss-20130318-1115811-0-5}, timestamp = {Sat, 17 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/dnb/Pfoh13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijbc/CelikovskyL12, author = {Sergej Celikovsk{\'{y}} and Volodymyr Lynnyk}, title = {Desynchronization Chaos Shift Keying Method Based on the Error Second derivative and its Security Analysis}, journal = {Int. J. Bifurc. Chaos}, volume = {22}, number = {9}, year = {2012}, url = {https://doi.org/10.1142/S0218127412502318}, doi = {10.1142/S0218127412502318}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijbc/CelikovskyL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/X11fc, editor = {Henk C. A. van Tilborg and Sushil Jajodia}, title = {Higher Order Derivative Attack}, booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed}, pages = {556}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4419-5906-5\_1104}, doi = {10.1007/978-1-4419-5906-5\_1104}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/X11fc.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/giq/Gellman04, author = {Robert Gellman}, title = {Privacy and security: Assessing database derivative activities}, journal = {Gov. Inf. Q.}, volume = {21}, number = {4}, pages = {498--504}, year = {2004}, url = {https://doi.org/10.1016/j.giq.2004.08.005}, doi = {10.1016/J.GIQ.2004.08.005}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/giq/Gellman04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/naa/Pauletto00, author = {Giorgio Pauletto}, editor = {Lubin G. Vulkov and Jerzy Wasniewski and Plamen Y. Yalamov}, title = {Parallel Monte Carlo Methods for Derivative Security Pricing}, booktitle = {Numerical Analysis and Its Applications, Second International Conference, {NAA} 2000, Rousse, Bulgaria, June 11-15, 2000, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {1988}, pages = {650--657}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-45262-1\_77}, doi = {10.1007/3-540-45262-1\_77}, timestamp = {Tue, 14 May 2019 10:00:44 +0200}, biburl = {https://dblp.org/rec/conf/naa/Pauletto00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/JoyeLH99, author = {Marc Joye and Narn{-}Yih Lee and Tzonelih Hwang}, editor = {Masahiro Mambo and Yuliang Zheng}, title = {On the Security of the Lee-Chang Group Signature Scheme and Its Derivatives}, booktitle = {Information Security, Second International Workshop, ISW'99, Kuala Lumpur, Malaysia, November 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1729}, pages = {47--51}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-47790-X\_5}, doi = {10.1007/3-540-47790-X\_5}, timestamp = {Thu, 02 Dec 2021 11:46:17 +0100}, biburl = {https://dblp.org/rec/conf/isw/JoyeLH99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/el/95/CarrJ95, author = {Peter P. Carr and Robert A. Jarrow}, editor = {Robert A. Jarrow and Vojislav Maksimovic and William T. Ziemba}, title = {Chapter 7 {A} discrete time synthesis of derivative security valuation using a term structure of futures prices}, booktitle = {Finance}, series = {Handbooks in operations research and management science}, volume = {9}, pages = {225--249}, publisher = {Elsevier}, year = {1995}, url = {https://doi.org/10.1016/s0927-0507(05)80051-9}, doi = {10.1016/S0927-0507(05)80051-9}, timestamp = {Tue, 07 Nov 2023 12:00:44 +0100}, biburl = {https://dblp.org/rec/books/el/95/CarrJ95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.