scroll to top
0

Mobile Menu

Header Layout

EBSCO Auth Banner

Let's find your institution. Click here.

Page title

Advanced Search Results For "LEAKS (Disclosure of information)"

1 - 10 of 4,124 results for
 "LEAKS (Disclosure of information)"
Results per page:

Foundations of Differentially Oblivious Algorithms.

Publication Type:Academic Journal

Source(s):Journal of the ACM. Jul2022, Vol. 69 Issue 4, p1-49. 49p.

Abstract:It is well-known that a program's memory access pattern can leak information about its input. To thwart such leakage, most existing works adopt the technique of oblivious RAM (ORAM) simulation. Such an obliviousness notion has stimulated much debate. A...

View details

FOLLLOW THE MONEY.

Publication Type:Periodical

Source(s):TIME Magazine. 4/25/2022, Vol. 199 Issue 15/16, p30-35. 6p. 4 Color Photographs.

Abstract:The day after that, at a White House press conference, Maggie Haberman from the New York Times asked Trump's press secretary Sarah Huckabee Sanders, "Is [President Trump] open to having U.S. officials questioned by Russia?" Sergei Magnitsky, center, wa...

View details

The Speed of Information and the Sell-Side Research Industry.

Publication Type:Academic Journal

Source(s):Journal of Financial & Quantitative Analysis. Aug2020, Vol. 55 Issue 5, p1467-1490. 24p.

Abstract:Between 2009 and 2013, the Fly on the Wall (FLY) leaked 58% of recommendation revisions with a median delay of 27 minutes relative to the IBES announcement time. We show that FLY improves price discovery, but leaked recommendations hamper brokers' abil...

View details

Deep learning-based patient re-identification is able to exploit the biometric nature of medical chest X-ray data.

Publication Type:Academic Journal

Source(s):Scientific Reports; 9/1/2022, Vol. 12 Issue 1, p1-13, 13p

Abstract:Copyright of Scientific Reports is the property of Springer Nature and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or ...

View details

Research on Side-Channel Analysis Based on Deep Learning with Different Sample Data.

Publication Type:Academic Journal

Source(s):Applied Sciences (2076-3417); Aug2022, Vol. 12 Issue 16, pN.PAG-N.PAG, 23p

Abstract:Copyright of Applied Sciences (2076-3417) is the property of MDPI and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or e...

View details

FogDedupe: A Fog-Centric Deduplication Approach Using Multi-Key Homomorphic Encryption Technique.

Publication Type:Academic Journal

Source(s):Journal of Sensors; 8/25/2022, p1-16, 16p

Abstract:Copyright of Journal of Sensors is the property of Hindawi Limited and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or ...

View details

Do Firms Strategically Internalize Disclosure Spillovers? Evidence from Cash‐Financed M&As.

Publication Type:Academic Journal

Source(s):Journal of Accounting Research (John Wiley & Sons, Inc.). Dec2020, Vol. 58 Issue 5, p1249-1297. 49p.

Abstract:We investigate whether managers internalize the spillover effects of their disclosure on the stock price of related firms and strategically alter their disclosure decisions when doing so is beneficial. Using data on firm‐initiated disclosures during al...

View details

A security method of hardware Trojan detection using path tracking algorithm.

Publication Type:Academic Journal

Source(s):EURASIP Journal on Wireless Communications & Networking; 9/5/2022, Vol. 2022 Issue 1, p1-21, 21p

Abstract:Copyright of EURASIP Journal on Wireless Communications & Networking is the property of Springer Nature and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. Ho...

View details

The Value of Offshore Secrets: Evidence from the Panama Papers.

Publication Type:Academic Journal

Source(s):Review of Financial Studies. Nov2019, Vol. 32 Issue 11, p4117-4155. 39p.

Abstract:We exploit one of the largest data leaks, to date, to study whether and how firms use secret offshore vehicles. From the leaked data, we identify 338 listed firms as users of secret offshore vehicles and document that these vehicles are used to finance...

View details

A tokenization technique for improving the security of EMV contactless cards.

Publication Type:Academic Journal

Source(s):Information Security Journal: A Global Perspective; 2022, Vol. 31 Issue 5, p511-526, 16p

Abstract:Copyright of Information Security Journal: A Global Perspective is the property of Taylor & Francis Ltd and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. Ho...

View details

banner_970x250 (970x250)

sponsored