Author of the publication

Discovering the impact of systemic and idiosyncratic risk factors on credit spread of corporate bond within the framework of intelligent knowledge management.

, , , and . Annals OR, 234 (1): 3-15 (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficiency Test in Chinese Plastic Futures Market., , and . BIFE, page 404-407. IEEE Computer Society, (2012)TMSUI: A Trust Management Scheme of USB Storage Devices for Industrial Control Systems., , , , and . ICICS, volume 9543 of Lecture Notes in Computer Science, page 152-168. Springer, (2015)Discovering the impact of systemic and idiosyncratic risk factors on credit spread of corporate bond within the framework of intelligent knowledge management., , , and . Annals OR, 234 (1): 3-15 (2015)Automated Proof for Authorization Protocols of TPM 2.0 in Computational Model (full version)., , and . IACR Cryptology ePrint Archive, (2014)Formal Analysis of a TTP-Free Blacklistable Anonymous Credentials System (Full Version)., , , and . IACR Cryptology ePrint Archive, (2017)Automated Proof for Authorization Protocols of TPM 2.0 in Computational Model., , and . ISPEC, volume 8434 of Lecture Notes in Computer Science, page 144-158. Springer, (2014)Formal Analysis of a TTP-Free Blacklistable Anonymous Credentials System., , , and . ICICS, volume 10631 of Lecture Notes in Computer Science, page 3-16. Springer, (2017)Information Properties of Boundary Line Models for N2O Emissions from Agricultural Soils., , , , and . Entropy, 15 (3): 972-987 (2013)ExBLACR: Extending BLACR System., , , , , and . ACISP, volume 8544 of Lecture Notes in Computer Science, page 397-412. Springer, (2014)Automated Security Proof of Cryptographic Support Commands in TPM 2.0., , , , and . ICICS, volume 9977 of Lecture Notes in Computer Science, page 431-441. Springer, (2016)