University of Mississippi

Displaying 1-7 of 7 results

  • White Papers // May 2013

    An Efficient Group Authentication for Group Communications

    Group communication implies a many-to-many communication and it goes beyond both one-to-one communication (i.e., unicast) and one-to-many communication (i.e., multicast). Unlike most user authentication protocols that authenticate a single user each time, the authors propose a new type of authentication, called group authentication that authenticates all users in a group...

    Provided By University of Mississippi

  • White Papers // Jul 2012

    The Effect of the Number of Rounds and SBoxes on the Error Performance and Security in a Class of Symmetric Encryption Algorithms

    The number of rounds and S-Boxes in any symmetric cryptosystem plays a great role on its security as well as on the probability of correct reception at the receiver after decryption. This paper considers a class of symmetric encryption algorithms based on the Data Encryption Standard (DES) and sheds lights...

    Provided By University of Mississippi

  • White Papers // Jun 2010

    Credit Line Availability And Utilization In REITs

    Analysis of REIT credit line availability and use under normal conditions and during the recent financial crisis are provided. Descriptive statistics indicate REIT credit lines represent an important component of capital structure, credit line availability and utilization have increased substantially over the sample period, and REITs maintain precautionary liquidity via...

    Provided By University of Mississippi

  • White Papers // Jan 2009

    Signaling, Free Cash Flow And ?Nonmonotonic? Dividends

    Why does a firm pay dividends? Miller and Modigliani (1961) show that, under certain conditions, dividend policy is irrelevant to firm value. Since then, many arguments have been proposed to rationalize why dividends matter. Maybe firms pay dividends to attract certain clienteles, or maybe to signal information to the market,...

    Provided By University of Mississippi

  • White Papers // Jan 2009

    Signaling, Free Cash Flow And "Nonmonotonic" Dividends

    Why does a firm pay dividends? Miller and Modigliani (1961) show that, under certain conditions, dividend policy is irrelevant to firm value. Since then, many arguments have been proposed to rationalize why dividends matter. Maybe firms pay dividends to attract certain clienteles, or maybe to signal information to the market,...

    Provided By University of Mississippi

  • White Papers // Jan 2009

    An Efficient Secure Deletion Scheme for Flash File Systems

    Secure deletion for flash file systems is essential for enhancing the security of embedded systems. Due to the characteristics of flash memory, existing secure deletion schemes cannot be directly adapted to flash file systems. In this paper, the authors propose an efficient secure deletion scheme for flash file systems. It...

    Provided By University of Mississippi

  • White Papers // Aug 2008

    Should Central Banks Burst Bubbles? Some Microeconomic Issues

    Policy towards speculative bubbles is examined in a model of a finite horizon "Greater fool" bubble, with rational agents, asymmetric information and short-sales constraints. This model permits the use of standard tools of comparative dynamics and welfare economics to analyze bubble policies. Government policy is modeled as deflating overpriced assets...

    Provided By University of Mississippi

  • White Papers // Jan 2009

    An Efficient Secure Deletion Scheme for Flash File Systems

    Secure deletion for flash file systems is essential for enhancing the security of embedded systems. Due to the characteristics of flash memory, existing secure deletion schemes cannot be directly adapted to flash file systems. In this paper, the authors propose an efficient secure deletion scheme for flash file systems. It...

    Provided By University of Mississippi

  • White Papers // May 2013

    An Efficient Group Authentication for Group Communications

    Group communication implies a many-to-many communication and it goes beyond both one-to-one communication (i.e., unicast) and one-to-many communication (i.e., multicast). Unlike most user authentication protocols that authenticate a single user each time, the authors propose a new type of authentication, called group authentication that authenticates all users in a group...

    Provided By University of Mississippi

  • White Papers // Jan 2009

    Signaling, Free Cash Flow And ?Nonmonotonic? Dividends

    Why does a firm pay dividends? Miller and Modigliani (1961) show that, under certain conditions, dividend policy is irrelevant to firm value. Since then, many arguments have been proposed to rationalize why dividends matter. Maybe firms pay dividends to attract certain clienteles, or maybe to signal information to the market,...

    Provided By University of Mississippi

  • White Papers // Jan 2009

    Signaling, Free Cash Flow And "Nonmonotonic" Dividends

    Why does a firm pay dividends? Miller and Modigliani (1961) show that, under certain conditions, dividend policy is irrelevant to firm value. Since then, many arguments have been proposed to rationalize why dividends matter. Maybe firms pay dividends to attract certain clienteles, or maybe to signal information to the market,...

    Provided By University of Mississippi

  • White Papers // Jun 2010

    Credit Line Availability And Utilization In REITs

    Analysis of REIT credit line availability and use under normal conditions and during the recent financial crisis are provided. Descriptive statistics indicate REIT credit lines represent an important component of capital structure, credit line availability and utilization have increased substantially over the sample period, and REITs maintain precautionary liquidity via...

    Provided By University of Mississippi

  • White Papers // Aug 2008

    Should Central Banks Burst Bubbles? Some Microeconomic Issues

    Policy towards speculative bubbles is examined in a model of a finite horizon "Greater fool" bubble, with rational agents, asymmetric information and short-sales constraints. This model permits the use of standard tools of comparative dynamics and welfare economics to analyze bubble policies. Government policy is modeled as deflating overpriced assets...

    Provided By University of Mississippi

  • White Papers // Jul 2012

    The Effect of the Number of Rounds and SBoxes on the Error Performance and Security in a Class of Symmetric Encryption Algorithms

    The number of rounds and S-Boxes in any symmetric cryptosystem plays a great role on its security as well as on the probability of correct reception at the receiver after decryption. This paper considers a class of symmetric encryption algorithms based on the Data Encryption Standard (DES) and sheds lights...

    Provided By University of Mississippi