Search dblp for Publications

export results for "derivative security"

 download as .bib file

@article{DBLP:journals/jap/SiuZY19,
  author       = {Tak Kuen Siu and
                  Jinxia Zhu and
                  Hailiang Yang},
  title        = {A martingale approach for asset allocation with derivative security
                  and hidden economic risk},
  journal      = {J. Appl. Probab.},
  volume       = {56},
  number       = {3},
  pages        = {723--749},
  year         = {2019},
  url          = {https://doi.org/10.1017/jpr.2019.40},
  doi          = {10.1017/JPR.2019.40},
  timestamp    = {Thu, 16 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jap/SiuZY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aina/HajatiCSZG19,
  author       = {Farshid Hajati and
                  Ali Cheraghian and
                  Omid Ameri Sianaki and
                  Behnam Zeinali and
                  Soheila Gheisari},
  editor       = {Leonard Barolli and
                  Makoto Takizawa and
                  Fatos Xhafa and
                  Tomoya Enokido},
  title        = {Polar Topographic Derivatives for 3D Face Recognition: Application
                  to Internet of Things Security},
  booktitle    = {Web, Artificial Intelligence and Network Applications - Proceedings
                  of the Workshops of the 33rd International Conference on Advanced
                  Information Networking and Applications, {AINA} Workshops 2019, Matsue,
                  Japan, March 27-29, 2019},
  series       = {Advances in Intelligent Systems and Computing},
  volume       = {927},
  pages        = {936--945},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-15035-8\_92},
  doi          = {10.1007/978-3-030-15035-8\_92},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/aina/HajatiCSZG19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/dnb/Pfoh13,
  author       = {Jonas Pfoh},
  title        = {Leveraging derivative virtual machine introspection methods for security
                  applications},
  school       = {Technical University Munich},
  year         = {2013},
  url          = {https://nbn-resolving.org/urn:nbn:de:bvb:91-diss-20130318-1115811-0-5},
  urn          = {urn:nbn:de:bvb:91-diss-20130318-1115811-0-5},
  timestamp    = {Sat, 17 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/dnb/Pfoh13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijbc/CelikovskyL12,
  author       = {Sergej Celikovsk{\'{y}} and
                  Volodymyr Lynnyk},
  title        = {Desynchronization Chaos Shift Keying Method Based on the Error Second
                  derivative and its Security Analysis},
  journal      = {Int. J. Bifurc. Chaos},
  volume       = {22},
  number       = {9},
  year         = {2012},
  url          = {https://doi.org/10.1142/S0218127412502318},
  doi          = {10.1142/S0218127412502318},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijbc/CelikovskyL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/X11fc,
  editor       = {Henk C. A. van Tilborg and
                  Sushil Jajodia},
  title        = {Higher Order Derivative Attack},
  booktitle    = {Encyclopedia of Cryptography and Security, 2nd Ed},
  pages        = {556},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4419-5906-5\_1104},
  doi          = {10.1007/978-1-4419-5906-5\_1104},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/X11fc.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/giq/Gellman04,
  author       = {Robert Gellman},
  title        = {Privacy and security: Assessing database derivative activities},
  journal      = {Gov. Inf. Q.},
  volume       = {21},
  number       = {4},
  pages        = {498--504},
  year         = {2004},
  url          = {https://doi.org/10.1016/j.giq.2004.08.005},
  doi          = {10.1016/J.GIQ.2004.08.005},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/giq/Gellman04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/naa/Pauletto00,
  author       = {Giorgio Pauletto},
  editor       = {Lubin G. Vulkov and
                  Jerzy Wasniewski and
                  Plamen Y. Yalamov},
  title        = {Parallel Monte Carlo Methods for Derivative Security Pricing},
  booktitle    = {Numerical Analysis and Its Applications, Second International Conference,
                  {NAA} 2000, Rousse, Bulgaria, June 11-15, 2000, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {1988},
  pages        = {650--657},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-45262-1\_77},
  doi          = {10.1007/3-540-45262-1\_77},
  timestamp    = {Tue, 14 May 2019 10:00:44 +0200},
  biburl       = {https://dblp.org/rec/conf/naa/Pauletto00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/JoyeLH99,
  author       = {Marc Joye and
                  Narn{-}Yih Lee and
                  Tzonelih Hwang},
  editor       = {Masahiro Mambo and
                  Yuliang Zheng},
  title        = {On the Security of the Lee-Chang Group Signature Scheme and Its Derivatives},
  booktitle    = {Information Security, Second International Workshop, ISW'99, Kuala
                  Lumpur, Malaysia, November 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1729},
  pages        = {47--51},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-47790-X\_5},
  doi          = {10.1007/3-540-47790-X\_5},
  timestamp    = {Thu, 02 Dec 2021 11:46:17 +0100},
  biburl       = {https://dblp.org/rec/conf/isw/JoyeLH99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/el/95/CarrJ95,
  author       = {Peter P. Carr and
                  Robert A. Jarrow},
  editor       = {Robert A. Jarrow and
                  Vojislav Maksimovic and
                  William T. Ziemba},
  title        = {Chapter 7 {A} discrete time synthesis of derivative security valuation
                  using a term structure of futures prices},
  booktitle    = {Finance},
  series       = {Handbooks in operations research and management science},
  volume       = {9},
  pages        = {225--249},
  publisher    = {Elsevier},
  year         = {1995},
  url          = {https://doi.org/10.1016/s0927-0507(05)80051-9},
  doi          = {10.1016/S0927-0507(05)80051-9},
  timestamp    = {Tue, 07 Nov 2023 12:00:44 +0100},
  biburl       = {https://dblp.org/rec/books/el/95/CarrJ95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics