Results 1 - 10
of
14,417
Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
, 2008
"... We provide formal definitions and efficient secure techniques for • turning noisy information into keys usable for any cryptographic application, and, in particular, • reliably and securely authenticating biometric data. Our techniques apply not just to biometric information, but to any keying mater ..."
Abstract
-
Cited by 535 (38 self)
- Add to MetaCart
, it can be used to reliably reproduce error-prone biometric inputs without incurring the security risk inherent in storing them. We define the primitives to be both formally secure and versatile, generalizing much prior work. In addition, we provide nearly optimal constructions of both primitives
Data Security
, 1979
"... The rising abuse of computers and increasing threat to personal privacy through data banks have stimulated much interest m the techmcal safeguards for data. There are four kinds of safeguards, each related to but distract from the others. Access controls regulate which users may enter the system and ..."
Abstract
-
Cited by 615 (3 self)
- Add to MetaCart
of statistical queries and correlating the responses. Statlstmal data banks are much less secure than most people beheve. Data encryption attempts to prevent unauthorized disclosure of confidential information in transit or m storage. This paper describes the general nature of controls of each type, the kinds
Securing ad hoc networks
"... Ad hoc networks are a new wireless networking paradigm for mobile hosts. Unlike traditional mobile wireless networks, ad hoc networks do not rely on any fixed infrastructure. Instead, hosts rely on each other to keep the network connected. The military tactical and other security-sensitive operation ..."
Abstract
-
Cited by 1064 (15 self)
- Add to MetaCart
network faces and the security goals to be achieved. We identify the new challenges and opportunities posed by this new networking environment and explore new approaches to secure its communication. In particular, we take advantage of the inherent redundancy in ad hoc networks — multiple routes between
Tinysec: A link layer security architecture for wireless sensor networks
- in Proc of the 2nd Int’l Conf on Embedded Networked Sensor Systems
"... We introduce TinySec, the first fully-implemented link layer security architecture for wireless sensor networks. In our design, we leverage recent lessons learned from design vulnerabilities in security protocols for other wireless networks such as 802.11b and GSM. Conventional security protocols te ..."
Abstract
-
Cited by 521 (0 self)
- Add to MetaCart
the tradeoffs among different cryptographic primitives and use the inherent sensor network limitations to our advantage when choosing parameters to find a sweet spot for security, packet overhead, and resource requirements. TinySec is portable to a variety of hardware and radio platforms. Our experimental
Xen and the art of virtualization
- IN SOSP
, 2003
"... Numerous systems have been designed which use virtualization to subdivide the ample resources of a modern computer. Some require specialized hardware, or cannot support commodity operating systems. Some target 100 % binary compatibility at the expense of performance. Others sacrifice security or fun ..."
Abstract
-
Cited by 2010 (35 self)
- Add to MetaCart
Numerous systems have been designed which use virtualization to subdivide the ample resources of a modern computer. Some require specialized hardware, or cannot support commodity operating systems. Some target 100 % binary compatibility at the expense of performance. Others sacrifice security
The performance of mutual funds in the period 1945-1964
- JOURNAL OF FINANCE
, 1968
"... In this paper I derive a risk-adjusted measure of portfolio performance (now known as "Jensen's Alpha") that estimates how much a manager's forecasting ability contributes to the fund's returns. The measure is based on the theory of the pricing of capital assets by Sharpe (1 ..."
Abstract
-
Cited by 615 (1 self)
- Add to MetaCart
In this paper I derive a risk-adjusted measure of portfolio performance (now known as "Jensen's Alpha") that estimates how much a manager's forecasting ability contributes to the fund's returns. The measure is based on the theory of the pricing of capital assets by Sharpe
Measuring security price performance
- Journal of Financial Economics
, 1980
"... Event studies focus on the impact of particular types of firm-specific events on the prices of the affected firms ’ securities. In this paper, observed stock return data are employed to examine various methodologies which are used 111 event studies to measure security price performance. Abnormal per ..."
Abstract
-
Cited by 379 (2 self)
- Add to MetaCart
Event studies focus on the impact of particular types of firm-specific events on the prices of the affected firms ’ securities. In this paper, observed stock return data are employed to examine various methodologies which are used 111 event studies to measure security price performance. Abnormal
Investor psychology and asset pricing
, 2001
"... The basic paradigm of asset pricing is in vibrant flux. The purely rational approach is being subsumed by a broader approach based upon the psychology of investors. In this approach, security expected returns are determined by both risk and misvaluation. This survey sketches a framework for understa ..."
Abstract
-
Cited by 420 (27 self)
- Add to MetaCart
The basic paradigm of asset pricing is in vibrant flux. The purely rational approach is being subsumed by a broader approach based upon the psychology of investors. In this approach, security expected returns are determined by both risk and misvaluation. This survey sketches a framework
The Determinants of Credit Spread Changes.
- Journal of Finance
, 2001
"... ABSTRACT Using dealer's quotes and transactions prices on straight industrial bonds, we investigate the determinants of credit spread changes. Variables that should in theory determine credit spread changes have rather limited explanatory power. Further, the residuals from this regression are ..."
Abstract
-
Cited by 422 (2 self)
- Add to MetaCart
in the corporate bond market is driven by local supply/demand shocks that are independent of both changes in credit-risk and typical measures of liquidity. We note that a similar, but significantly smaller effect has been documented in the mortgage backed (Ginnie Mae) securities market by Boudoukh, Richardson
How Social Security and Medicare Affect Retirement Behavior in a World of Incomplete Markets
- ECONOMETRICA
, 1997
"... This paper provides an empirical analysis of how the U.S. Social Security and Medicare insurance system affect the labor supply of older males in the presence of incomplete markets for loans, annuities, and health insurance. We estimate a detailed dynamic programming (DP) model of the joint labor ..."
Abstract
-
Cited by 371 (11 self)
- Add to MetaCart
This paper provides an empirical analysis of how the U.S. Social Security and Medicare insurance system affect the labor supply of older males in the presence of incomplete markets for loans, annuities, and health insurance. We estimate a detailed dynamic programming (DP) model of the joint labor
Results 1 - 10
of
14,417