In search of sticky protocols

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Labor Market Search, Sticky Prices, and Interest Rate Policies

What accounts for the significant real effects of monetary policy shocks? And what accounts for the persistent and hump shaped responses of output and inflation in response to such shocks? These questions are investigated in a model that incorporates labor market search, habit persistence, sticky prices, and policy inertia. While habit persistence and price stickiness are important for the hump...

متن کامل

Adverse Selection, Search Costs and Sticky Credit Card Rates

Several scholars of financial economics observed that during the 1980s, market interest rates declined continuously with little or no impact on credit card rates. Recently, Meyercord (1994), Sinkey and Nash (1993), and Sullivan and Worden (1995) recorded sigmficant changes in the credit card market intffcating an increased level of competition. This study represents an attempt to determine the ...

متن کامل

Sticky Prices vs . Sticky Information

The working papers published in the Series constitute work in progress circulated to stimulate discussion and critical comments. Views expressed represent exclusively the authors' own opinions and do not necessarily refl ect those of the editors. Die Deutsche Bibliothek verzeichnet diese Publikation in der deutschen National-bibliografi e; detaillierte bibliografi sche Daten sind im Internet üb...

متن کامل

On Private Similarity Search Protocols

In a private similarity search (PSS) protocol, a client receives from the database the entry, closest to her query, without either the client or the database getting to know more information than necessary. PSS protocols have potentially wide application in areas like bioinformatics, where precise queries might be impossible. We show that the previously proposed PSS protocols by Du and Atallah ...

متن کامل

automatic verification of authentication protocols using genetic programming

implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...

15 صفحه اول

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Nature Cell Biology

سال: 2002

ISSN: 1465-7392,1476-4679

DOI: 10.1038/ncb0402-e80