Sciweavers

57 search results - page 5 / 12
» Perspectives on Financial Cryptography
Sort
View
ICEB
2004
297views Business» more  ICEB 2004»
13 years 8 months ago
Security Measures in Mobile Commerce: Problems and Solutions
Due to the advent of the Internet, electronic business transactions have exploded around the globe. Along with the Internet, wireless technology has exponentially developed as wel...
Sanwar Ali, Waleed Farag, Mohammad A. Rob
FGCN
2008
IEEE
143views Communications» more  FGCN 2008»
14 years 1 months ago
The Study of Location Strategy for Bank
In this paper, authors attempt to shed light on the factors that influence the locations of bank branches in establishing a bank’s branch network from the angle of the network a...
Jae Weon Hong, Won Eui Hong, Yoon-Sik Kwak
MANSCI
2008
122views more  MANSCI 2008»
13 years 7 months ago
Incorporating Asymmetric Distributional Information in Robust Value-at-Risk Optimization
Value-at-Risk (VaR) is one of the most widely accepted risk measures in the financial and insurance industries, yet efficient optimization of VaR remains a very difficult problem....
Karthik Natarajan, Dessislava Pachamanova, Melvyn ...
RECONFIG
2009
IEEE
118views VLSI» more  RECONFIG 2009»
14 years 2 months ago
Protecting the NOEKEON Cipher against SCARE Attacks in FPGAs by Using Dynamic Implementations
Abstract. Protecting an implementation against Side Channel Analysis for Reverse Engineering (SCARE) attacks is a great challenge and we address this challenge by presenting a fir...
Julien Bringer, Hervé Chabanne, Jean-Luc Da...
DSOM
2007
Springer
14 years 1 months ago
On the Risk Exposure and Priority Determination of Changes in IT Service Management
This paper deals with the Change Management process within IT Service Management. Change Management includes several activities, some of which need to evaluate the risk exposure as...
Jacques Philippe Sauvé, Rodrigo A. Santos, ...