An insurance theory based optimal cyber-insurance contract against moral hazard (Englisch)
- Neue Suche nach: Dou, Wanchun
- Neue Suche nach: Tang, Wenda
- Weitere Informationen zu Tang, Wenda:
- https://orcid.org/0000-0001-6684-4642
- Neue Suche nach: Wu, Xiaotong
- Neue Suche nach: Qi, Lianyong
- Neue Suche nach: Xu, Xiaolong
- Neue Suche nach: Zhang, Xuyun
- Neue Suche nach: Hu, Chunhua
- Neue Suche nach: Dou, Wanchun
- Neue Suche nach: Tang, Wenda
- Neue Suche nach: Wu, Xiaotong
- Neue Suche nach: Qi, Lianyong
- Neue Suche nach: Xu, Xiaolong
- Neue Suche nach: Zhang, Xuyun
- Neue Suche nach: Hu, Chunhua
In:
Information Sciences
;
527
;
576-589
;
2018
-
ISSN:
- Aufsatz (Zeitschrift) / Elektronische Ressource
-
Titel:An insurance theory based optimal cyber-insurance contract against moral hazard
-
Beteiligte:Dou, Wanchun ( Autor:in ) / Tang, Wenda ( Autor:in ) / Wu, Xiaotong ( Autor:in ) / Qi, Lianyong ( Autor:in ) / Xu, Xiaolong ( Autor:in ) / Zhang, Xuyun ( Autor:in ) / Hu, Chunhua ( Autor:in )
-
Erschienen in:Information Sciences ; 527 ; 576-589
-
Verlag:
-
Erscheinungsdatum:21.12.2018
-
Format / Umfang:14 pages
-
ISSN:
-
DOI:
-
Medientyp:Aufsatz (Zeitschrift)
-
Format:Elektronische Ressource
-
Sprache:Englisch
-
Schlagwörter:
-
Datenquelle:
Inhaltsverzeichnis – Band 527
Zeige alle Jahrgänge und Ausgaben
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 1
-
Skewed non-Gaussian GARCH models for cryptocurrencies volatility modellingCerqueti, Roy / Giacalone, Massimiliano / Mattera, Raffaele et al. | 2020
- 27
-
General interval-valued overlap functions and interval-valued overlap indicesAsmus, Tiago da Cruz / Dimuro, Graçaliz Pereira / Bedregal, Benjamín / Sanz, José Antonio / Pereira, Sidnei Jr. / Bustince, Humberto et al. | 2020
- 51
-
Event-triggered control for stochastic networked control systems against Denial-of-Service attacksGuo, Li / Yu, Hao / Hao, Fei et al. | 2020
- 70
-
Robust Manhattan non-negative matrix factorization for image recovery and representationDai, Xiangguang / Su, Xiaojie / Zhang, Wei / Xue, Fangzheng / Li, Huaqing et al. | 2020
- 88
-
Efficient algorithms based on centrality measures for identification of top-K influential users in social networksAlshahrani, Mohammed / Fuxi, Zhu / Sameh, Ahmed / Mekouar, Soufiana / Huang, Sheng et al. | 2020
- 108
-
Privacy-Preserving distributed deep learning based on secret sharingDuan, Jia / Zhou, Jiantao / Li, Yuanman et al. | 2020
- 128
-
Fixed charge 4D-TP for a breakable item under hybrid random type-2 uncertain environmentsBera, Sukhendu / Giri, Pravash Kumar / Jana, Dipak Kumar / Basu, Kajla / Maiti, Manoranjan et al. | 2020
- 159
-
An endorsement-based trust bootstrapping approach for newcomer cloud servicesWahab, Omar Abdel / Cohen, Robin / Bentahar, Jamal / Otrok, Hadi / Mourad, Azzam / Rjoub, Gaith et al. | 2020
- 176
-
Pose-guided spatiotemporal alignment for video-based person Re-identificationGao, Changxin / Chen, Yang / Yu, Jin-Gang / Sang, Nong et al. | 2020
- 191
-
Adaptive neural network control for time-varying state constrained nonlinear stochastic systems with input saturationZhu, Qidan / Liu, Yongchao / Wen, Guoxing et al. | 2020
- 210
-
Privacy-enhanced remote data integrity checking with updatable timestampWu, Tong / Yang, Guomin / Mu, Yi / Chen, Rongmao / Xu, Shengmin et al. | 2020
- 227
-
Improving artificial Bee colony algorithm using a new neighborhood selection mechanismWang, Hui / Wang, Wenjun / Xiao, Songyi / Cui, Zhihua / Xu, Minyang / Zhou, Xinyu et al. | 2020
- 241
-
Cross-language question retrieval with multi-layer representation and layer-wise adversaryLi, Bo / Du, Xiaodong / Chen, Meng et al. | 2020
- 253
-
Quantum-inspired algorithm with fitness landscape approximation in reduced dimensional spaces for numerical function optimizationMu, Lei / Wang, Peng / Xin, Gang et al. | 2020
- 279
-
Hierarchical clustering supported by reciprocal nearest neighborsXie, Wen-Bo / Lee, Yan-Li / Wang, Cong / Chen, Duan-Bing / Zhou, Tao et al. | 2020
- 293
-
Special Section on Privacy Computing: Principles and ApplicationsChen, Jinjun / Yang, Laurence et al. | 2020
- 294
-
Privacy by Evidence: A Methodology to develop privacy-friendly software applicationsBarbosa, Pedro / Brito, Andrey / Almeida, Hyggo et al. | 2019
- 311
-
Effective privacy preserving data publishing by vectorizationEom, Chris Soo-Hyun / Lee, Charles Cheolgi / Lee, Wookey / Leung, Carson K. et al. | 2019
- 329
-
Cloud-based lightweight secure RFID mutual authentication protocol in IoTFan, Kai / Luo, Qi / Zhang, Kuan / Yang, Yintang et al. | 2019
- 341
-
Privacy-preserving computation in cyber-physical-social systems: A survey of the state-of-the-art and perspectivesFeng, Jun / Yang, Laurence T. / Gati, Nicholaus J. / Xie, Xia / Gavuna, Benard S. et al. | 2019
- 356
-
An efficient approach for secure multi-party computation without authenticated channelVu, Duy-Hien / Luong, The-Dung / Ho, Tu-Bao et al. | 2019
- 369
-
Incentive mechanism for cooperative authentication: An evolutionary game approachFang, Liang / Shi, Guozhen / Wang, Lianhai / Li, Yongjun / Xu, Shujiang / Guo, Yunchuan et al. | 2019
- 382
-
A privacy-preserving RFID authentication protocol based on El-Gamal cryptosystem for secure TMISSalem, Fatty M. / Amin, Ruhul et al. | 2019
- 394
-
Building a dynamic searchable encrypted medical database for multi-clientXu, Lei / Xu, Chungen / Liu, Joseph K. / Zuo, Cong / Zhang, Peng et al. | 2019
- 406
-
A trajectory privacy-preserving scheme based on a dual-K mechanism for continuous location-based servicesZhang, Shaobo / Mao, Xinjun / Choo, Kim-Kwang Raymond / Peng, Tao / Wang, Guojun et al. | 2019
- 420
-
Efficient privacy preservation of big data for accurate data miningChamikara, M.A.P. / Bertok, P. / Liu, D. / Camtepe, S. / Khalil, I. et al. | 2019
- 444
-
Exploiting location-related behaviors without the GPS data on smartphonesLi, Fenghua / Wang, Xinyu / Niu, Ben / Li, Hui / Li, Chao / Chen, Lihua et al. | 2019
- 460
-
APS: Attribute-aware privacy-preserving scheme in location-based servicesLi, Weihao / Li, Chen / Geng, Yeli et al. | 2019
- 477
-
Privacy-preserving task recommendation with win-win incentives for mobile crowdsourcingTang, Wenjuan / Zhang, Kuan / Ren, Ju / Zhang, Yaoxue et al. | 2019
- 493
-
A privacy-preserving cryptosystem for IoT E-healthcareHamza, Rafik / Yan, Zheng / Muhammad, Khan / Bellavista, Paolo / Titouna, Faiza et al. | 2019
- 511
-
APCN: A scalable architecture for balancing accountability and privacy in large-scale content-based networksMa, Yuxiang / Wu, Yulei / Li, Jun / Ge, Jingguo et al. | 2019
- 533
-
PRTA: A Proxy Re-encryption based Trusted Authorization scheme for nodes on CloudIoTSu, Mang / Zhou, Bo / Fu, Anmin / Yu, Yan / Zhang, Gongxuan et al. | 2019
- 548
-
Cloud-assisted privacy-conscious large-scale Markowitz portfolioZhang, Yushu / Jiang, Jin / Xiang, Yong / Zhu, Ye / Wan, Liangtian / Xie, Xiyuan et al. | 2018
- 560
-
CAMPS: Efficient and privacy-preserving medical primary diagnosis over outsourced cloudHua, Jiafeng / Shi, Guozhen / Zhu, Hui / Wang, Fengwei / Liu, Ximeng / Li, Hao et al. | 2018
- 576
-
An insurance theory based optimal cyber-insurance contract against moral hazardDou, Wanchun / Tang, Wenda / Wu, Xiaotong / Qi, Lianyong / Xu, Xiaolong / Zhang, Xuyun / Hu, Chunhua et al. | 2018
- 590
-
Blockchain-based system for secure outsourcing of bilinear pairingsLin, Chao / He, Debiao / Huang, Xinyi / Xie, Xiang / Choo, Kim-Kwang Raymond et al. | 2018
- 602
-
Preserving adjustable path privacy for task acquisition in Mobile Crowdsensing SystemsLuo, Guangchun / Yan, Ke / Zheng, Xu / Tian, Ling / Cai, Zhipeng et al. | 2018
- ii
-
Editorial Board| 2019