| |
|
|
|
|
|
|
|
1. |
Record Nr. |
UNINA9910971233503321 |
|
|
Autore |
Mwase Nkunde |
|
|
Titolo |
How much should I hold? Reserve Adequacy in Emerging Markets and Small Islands / / Nkunde Mwase |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Washington, D.C. : , : International Monetary Fund, , 2012 |
|
|
|
|
|
|
|
ISBN |
|
9781475553673 |
1475553676 |
9781475581881 |
1475581882 |
|
|
|
|
|
|
|
|
Edizione |
[1st ed.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (45 p.) |
|
|
|
|
|
|
Collana |
|
IMF Working Papers |
IMF working paper ; ; WP/12/205 |
|
|
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Reserves (Accounting) |
Investments - Developing countries |
Balance of payments |
Currency |
Current Account Adjustment |
Current account |
Economic & financial crises & disasters |
Exchange rate arrangements |
Exchange rate flexibility |
Exports and Imports |
Exports |
Financial Crises |
Financial crises |
Financial Risk Management |
Foreign Exchange |
Foreign exchange |
International economics |
International Finance Forecasting and Simulation |
International trade |
Monetary base |
Monetary economics |
Monetary Policy, Central Banking, and the Supply of Money and Credit: General |
Money and Monetary Policy |
Money supply |
Money |
|
|
|
|
|
|
|
|
|
|
|
|
Open Economy Macroeconomics |
Short-term Capital Movements |
Trade: General |
Dominican Republic |
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
Description based upon print version of record. |
|
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references. |
|
|
|
|
|
|
Nota di contenuto |
|
Cover; Abstract; Contents; I. Introduction; II. What Determines Reserve Holdings?; A. Data and Modeling Strategy; B. Empirical Results from Standard Panel OLS and Fixed Effects; C. Empirical Results from Quantile Regressions; III. A New Metric For Small Islands; A. Developing A Metric; B. Empirical Analysis to Determine Thresholds For the Metric; C. Estimation Results; IV. Conclusion; References; APPENDIX TABLES; 1. Country List; 2. Description of Variables; 3. SIs and EMs: Reserve Demand Regressions; 4. Full Sample: OLS and Quantile Regression Results |
5. SIs: OLS and Quantile Regression Results6. EM: OLS and Quantile Regression Results; 7. Full Sample: Inter-quantile Regression Results; 8. SIs: Inter-quantile Regression Results; 9. EM: Inter-quantile Regression Results; 10. SIs: Episodes of Exchange Market Pressure; 11. Comparison on Various Reserve Adequacy Metrics: Logit Regression; FIGURES; 1. EMs and SIs: Traditional Metrics, 2000-2010; 2. Sample Mean Average Actual and Predicted Reserves, 2007-2010; 3. Full Sample: Comparison of OLS and Quantile Regression Coefficient Estimate |
4. SIs: Comparison of OLS and Quantile Regression Coefficient Estimates5. EM: Comparison of OLS and Quantile Regression Coefficient Estimates; 6. EM and SIs: Concessional and Multilateral Debt, 1999-2009; 7. SIs: Exchange Market Pressure Crisis Episodes; 8. SIs: Exchange Market Pressure Crisis Episodes Triggers; 9. The Dominican Republic and Grenada: Balance of Payments Flows In Crisis Events; 10. Distribution of Export, Broad Money, and Short-Term Debt; 11. New Metric vs. Maximum of Traditional Metrics; 12. EMP Event Probability; 13. Reserves Against Risk-Weighted Metric |
|
|
|
|
|
|
|
|
Sommario/riassunto |
|
This paper investigates the drivers of reserves in emerging markets (EMs) and small island (SIs) and develops an operational metric for estimating reserves in SIs taking into account their unique characteristics. It uses quantile regression techniques to allow the estimated factors driving reserves holdings to vary along the reserves’ holding distribution and tests for equality among the slope coefficients of the various quantile regressions and the overall models. F-tests comparing the inter-quantile differences could not reject the that the models for the different quantiles of SIs reserve distribution were similar but this was rejected for EMs distribution suggesting that models explaining drivers of reserve holdings should take into account the country’s reserve holdings. Empirical analysis suggests that the metric performs better than existing metrics in reducing crisis probabilities in SIs. |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
2. |
Record Nr. |
UNISA996691666003316 |
|
|
Autore |
Nicomette Vincent |
|
|
Titolo |
Computer Security – ESORICS 2025 : 30th European Symposium on Research in Computer Security, Toulouse, France, September 22–24, 2025, Proceedings, Part II / / edited by Vincent Nicomette, Abdelmalek Benzekri, Nora Boulahia-Cuppens, Jaideep Vaidya |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2026 |
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
Edizione |
[1st ed. 2026.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (0 pages) |
|
|
|
|
|
|
Collana |
|
Lecture Notes in Computer Science, , 1611-3349 ; ; 16054 |
|
|
|
|
|
|
Altri autori (Persone) |
|
BenzekriAbdelmalek |
Boulahia-CuppensNora |
VaidyaJaideep |
|
|
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Data protection |
Cryptography |
Data encryption (Computer science) |
Computer networks - Security measures |
Computer networks |
Computer systems |
Data and Information Security |
Cryptology |
Security Services |
Mobile and Network Security |
Computer Communication Networks |
Computer System Implementation |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Nota di contenuto |
|
-- A Certified-Input Mixnet from Two-Party Mercurial Signatures on Randomizable Ciphertexts. -- Tetris! Traceable Extendable Threshold Ring Signatures and More. -- Efficient One-Pass Private Set Intersection from Pairings with Offline Preprocessing. -- Practical Robust Dynamic Searchable Symmetric Encryption Supporting Conjunctive Queries. -- Security Analysis of Covercrypt: A Quantum-Safe Hybrid Key Encapsulation Mechanism for Hidden Access Policies. |
|
|
|
|
|
|
|
|
|
|
|
-- Anamorphic Monero Transactions: the Threat of Bypassing Anti-Money Laundering Laws. -- Hyperion: Transparent End-to-End Verifiable Voting with Coercion Mitigation. -- Two-Factor Authenticated Key Exchange with Enhanced Security from Post-Quantum Assumptions. -- Concretely Efficient Parallel-accessible DORAM for 100K-sized Array. -- A Symbolic Analysis of Hash Functions Vulnerabilities in Maude-NPA. -- A post-quantum Distributed OPRF from the Legendre PRF. -- TERRA: Trojan-Resilient Reverse-Firewall for Cryptographic Applications. -- Reaction Attack on TFHE: Minimum Number of Oracle Queries and Nearly Optimum Attacking Scheme. -- Predicate-Private Asymmetric Searchable Encryption for Conjunctions from Lattices. -- DEBridge: Towards Secure and Practical Plausibly Deniable Encryption Based on USB Bridge Controller. -- Formalisation of KZG commitment schemes in EasyCrypt. -- UTRA: Universal Token Reusability Attack and Token Unforgeable Delegatable Order-Revealing Encryption. -- Enhanced Key Mismatch Attacks on Lattice-Based KEMs: Multi-bit Inference and Ciphertext Generalization. -- Code Encryption with Intel TME-MK for Control-Flow Enforcement. -- Optimized Privacy-Preserving Multi-Signatures from Discrete Logarithm Assumption. -- Polylogarithmic Polynomial Commitment Scheme over Galois Rings. -- Efficient Homomorphic Evaluation for Non-Polynomial Functions. -- Athena: Accelerating KeySwitch and Bootstrapping for Fully Homomorphic Encryption on CUDA GPU. -- Formally-verified Security against Forgery of Remote Attestation using SSProve. -- SafePath: Encryption-less On-demand Input Path Protection for Mobile Devices. -- Extending Groth16 for Disjunctive Statements. |
|
|
|
|
|
|
Sommario/riassunto |
|
This four-volume set LNCS 16053-16056 constitutes the refereed proceedings of the 30th European Symposium on Research in Computer Security, ESORICS 2025, held in Toulouse, France, during September 22–24, 2025. The 100 full papers presented in these proceedings were carefully reviewed and selected from 600 submissions. They were organized in topical sections as follows: AI and Data-Centric Security, Systems and Hardware Security, Privacy, Cryptography and Secure Protocol Design, Blockchain and Financial Security, Privacy Policy and Identity Management, Adversarial and Backdoor Defenses. . |
|
|
|
|
|
|
|
| |