Results 1 - 10
of
1,967
Investor psychology and security market under- and overreactions
- Journal of Finance
, 1998
"... We propose a theory of securities market under- and overreactions based on two well-known psychological biases: investor overconfidence about the precision of private information; and biased self-attribution, which causes asymmetric shifts in investors ’ confidence as a function of their investment ..."
Abstract
-
Cited by 698 (43 self)
- Add to MetaCart
-run earnings “drift, ” but negative correlation between future returns and long-term past stock market and accounting performance. The theory also offers several untested implications and implications for corporate fi-nancial policy. IN RECENT YEARS A BODY OF evidence on security returns has presented a sharp
Security In Wireless Sensor Networks
- COMMUNICATIONS OF THE ACM
, 2004
"... Wireless sensor network applications include ocean and wildlife monitoring, manufacturing machinery performance monitoring, building safety and earthquake monitoring, and
many military applications. An even wider spectrum of future applications is likely to follow, including
the monitoring of highw ..."
Abstract
-
Cited by 360 (5 self)
- Add to MetaCart
security issues in these networks, discuss the state of the art in sensor network security, and suggest
future directions for research. We cover several important security challenges, including key establishment, secrecy, authentication, privacy, robustness to denial-of-service attacks, secure routing
Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems
, 2003
"... Like many technologies, low-cost Radio Frequency Identification (RFID) systems will become pervasive in our daily lives when affixed to everyday consumer items as "smart labels". While yielding great productivity gains, RFID systems may create new threats to the security and privacy of ..."
Abstract
-
Cited by 311 (5 self)
- Add to MetaCart
of individuals or organizations. This paper presents a brief description of RFID systems and their operation. We describe privacy and security risks and how they apply to the unique setting of low-cost RFID devices. We propose several security mechanisms and suggest areas for future research.
Learning from imbalanced data
- IEEE Trans. on Knowledge and Data Engineering
, 2009
"... Abstract—With the continuous expansion of data availability in many large-scale, complex, and networked systems, such as surveillance, security, Internet, and finance, it becomes critical to advance the fundamental understanding of knowledge discovery and analysis from raw data to support decision-m ..."
Abstract
-
Cited by 260 (6 self)
- Add to MetaCart
of the problem, the state-of-the-art technologies, and the current assessment metrics used to evaluate learning performance under the imbalanced learning scenario. Furthermore, in order to stimulate future research in this field, we also highlight the major opportunities and challenges, as well as potential
Privacy and Security Challenges of RFID
"... This paper reviews the background of Radio Frequency Identification (RFID) systems as well as the ethical foundations of individual privacy. A number of applications were also explored with the intention of identifying the technology’s benefits and possible misuses. The authors offer an overview and ..."
Abstract
- Add to MetaCart
and discussion of the most important ethical issues concerning RFID, describe, and examine some methods of protecting privacy. Additionally, the paper examines the security risks associated with RFID technology, and privacy issues and challenges that they present to the operations of a business that implement
Challenges in Securing Vehicular Networks
- PROCEEDINGS OF THE WORKSHOP ON HOT TOPICS IN NETWORKS (HOTNETS-IV)
, 2005
"... In the near future, most new vehicles will be equipped with shortrange radios capable of communicating with other vehicles or with highway infrastructure at distances of at least one kilometer. The radios will allow new applications that will revolutionize the driving experience, providing everythin ..."
Abstract
-
Cited by 119 (1 self)
- Add to MetaCart
life-or-death decisions, making fail-safe security a necessity. However, providing strong security in vehicular networks raises important privacy concerns that must also be considered. To address these challenges, we propose a set of security primitives that can be used as the building blocks of secure
RFID Security: Attacks, Countermeasures and Challenges
"... Low-cost RFID tags are already being used for supply chain management and are a promising new technology that can be used to support the security of wireless ubiquitous applications. However current RFID technology is designed to optimize performance, with less attention paid to resilience and secur ..."
Abstract
-
Cited by 3 (0 self)
- Add to MetaCart
Low-cost RFID tags are already being used for supply chain management and are a promising new technology that can be used to support the security of wireless ubiquitous applications. However current RFID technology is designed to optimize performance, with less attention paid to resilience
Mobile RFID Applications and Security Challenges
"... Abstract. With mobile RFID technology, handheld portable devices like mobile phones and PDAs, also behave as RFID readers and RFID tags. As RFID readers, mobile phones provide an user-friendly approach to quickly and efficiently scan, access and view information about RFID tagged items. As RFID tags ..."
Abstract
- Add to MetaCart
Abstract. With mobile RFID technology, handheld portable devices like mobile phones and PDAs, also behave as RFID readers and RFID tags. As RFID readers, mobile phones provide an user-friendly approach to quickly and efficiently scan, access and view information about RFID tagged items. As RFID
Security analysis of a cryptographically-enabled RFID device
- In 14th USENIX Security Symposium
, 2005
"... We describe our success in defeating the security of an RFID device known as a Digital Signature Transponder (DST). Manufactured by Texas Instruments, DST (and variant) devices help secure millions of SpeedPass TM payment transponders and automobile ignition keys. Our analysis of the DST involved th ..."
Abstract
-
Cited by 78 (8 self)
- Add to MetaCart
We describe our success in defeating the security of an RFID device known as a Digital Signature Transponder (DST). Manufactured by Texas Instruments, DST (and variant) devices help secure millions of SpeedPass TM payment transponders and automobile ignition keys. Our analysis of the DST involved
Wireless Network Security Protocol with Cryptography and RFID System
"... Abstract Wireless communication is very common and widely applicable technique in communication field. In these field new techniques invented that is called RFID technique, in which object having RFID tags on them are being accessed in radio frequency region. Cryptography (method involves the both ..."
Abstract
- Add to MetaCart
and tracking using radio waves. Each member has its unique id or RFID tag. However security and privacy pose significant challenges on the system. This paper will describe about the brief introduction of the old and dynamic method employed for network security that is cryptography. Cryptographic technique
Results 1 - 10
of
1,967