Resilient Authentication Using Path Independence
IEEE Transactions on Computers
Authentication metric analysis and design
ACM Transactions on Information and System Security (TISSEC)
Accountable certificate management using undeniable attestations
Proceedings of the 7th ACM conference on Computer and communications security
Information Hiding Techniques for Steganography and Digital Watermarking
Information Hiding Techniques for Steganography and Digital Watermarking
Efficient and Fresh Cerification
PKC '00 Proceedings of the Third International Workshop on Practice and Theory in Public Key Cryptography: Public Key Cryptography
IEEE Network: The Magazine of Global Internetworking
Hi-index | 0.01 |
In electronic commerce, traded digital objects are likely associated with several numerical values as well as their prices. These values may change unpredictably over time and bring risks both to the providers and to the consumers of the application. One possible strategy for hedging the risks is to introduce derivatives regarding the uncertain values. This paper shows a theoretical pricing equation of the derivatives when the underlying digital objects have systematic default or revocation risks. We can make use of this pricing to estimate the risks.