Academic literature on the topic 'Decryption'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Decryption.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Decryption"

1

Partala, Juha. "Symmetric Blind Decryption with Perfect Secrecy." Journal of Computer Networks and Communications 2017 (2017): 1–15. http://dx.doi.org/10.1155/2017/6575907.

Full text
Abstract:
A blind decryption scheme enables a user to query decryptions from a decryption server without revealing information about the plain-text message. Such schemes are useful, for example, for the implementation of privacy-preserving encrypted file storages and payment systems. In terms of functionality, blind decryption is close to oblivious transfer. For noiseless channels, information-theoretically secure oblivious transfer is impossible. However, in this paper, we show that this is not the case for blind decryption. We formulate a definition of perfect secrecy of symmetric blind decryption for
APA, Harvard, Vancouver, ISO, and other styles
2

Zheng, Ting, and Zhi Zhong Zhang. "A Method Based on Hash Table to Implement the NAS Layer Decryption in LTE Big Data Platform." Applied Mechanics and Materials 716-717 (December 2014): 1430–33. http://dx.doi.org/10.4028/www.scientific.net/amm.716-717.1430.

Full text
Abstract:
Firstly, this paper introduces the overall framework and design ideas of LTE big data platform. Secondly, it describes the principles of decrypting encrypted data. In view of the distribution characters of keys required by NAS layer decryption, a decryption scheme for analysis and implementation based on the data structure of hash bucket is proposed. Finally, this scheme is validated and analyzed. Aiming to studying decryption scheme of NAS date, applying this scheme to analyze the LTE big data platform and implementing the function of encrypt the NAS PDU in LTE big data platform. The scheme h
APA, Harvard, Vancouver, ISO, and other styles
3

Brygilevych, Volodymyr, Nazar Pelypets, and Vasyl Rabyk. "Encryption of text messages using multilayer neural networks." Computational Problems of Electrical Engineering 10, no. 2 (2020): 1–6. http://dx.doi.org/10.23939/jcpee2020.02.001.

Full text
Abstract:
The article considers an algorithm for encrypting / decrypting text messages using multilayer neural networks (MLNN). The algorithm involves three steps: training a neural network based on the training pairs formed from a basic set of characters found in the text; encryption of the message using the weight coefficients of the hidden layers; its decryption using the weight coefficients of the output layer. The conditions necessary for successful encryption / decryption with this algorithm are formed, its limitations are emphasized. The MLNN architecture and training algorithm are described. The
APA, Harvard, Vancouver, ISO, and other styles
4

Kundu, Srijita, and Ernest Y. Z. Tan. "Device-independent uncloneable encryption." Quantum 9 (January 8, 2025): 1582. https://doi.org/10.22331/q-2025-01-08-1582.

Full text
Abstract:
Uncloneable encryption, first introduced by Broadbent and Lord (TQC 2020) is a quantum encryption scheme in which a quantum ciphertext cannot be distributed between two non-communicating parties such that, given access to the decryption key, both parties cannot learn the underlying plaintext. In this work, we introduce a variant of uncloneable encryption in which several possible decryption keys can decrypt a particular encryption, and the security requirement is that two parties who receive independently generated decryption keys cannot both learn the underlying ciphertext. We show that this
APA, Harvard, Vancouver, ISO, and other styles
5

Popescu, Narcis I., Cristina Lupu, and Florea Lupu. "Calcium Ionophore-Induced Tissue Factor (TF) Decryption Induces TF Immobilization Into Lipid Rafts and Negative Regulation of TF Procoagulant Activity." Blood 116, no. 21 (2010): 1131. http://dx.doi.org/10.1182/blood.v116.21.1131.1131.

Full text
Abstract:
Abstract Abstract 1131 Cell exposed tissue factor (TF), the physiologic initiator of blood coagulation, is normally expressed in a low procoagulant, or cryptic conformation, and requires activation, or decryption, to fully exhibit its procoagulant potential. TF decryption is not fully understood and multiple decrypting mechanisms have been proposed including phosphatidylserine (PS) exposure, TF monomerization, association with lipid rafts and redox modulation of TF. Calcium ionophores have been extensively used as TF decrypting agents, and both PS-dependent and independent mechanisms have been
APA, Harvard, Vancouver, ISO, and other styles
6

Liang, Hangyu. "The Battle of Advantage between Stealing and Decrypting the German Naval Enigma Key in the Battle of the Atlantic (1940-1941)." Transactions on Social Science, Education and Humanities Research 12 (August 29, 2024): 346–54. http://dx.doi.org/10.62051/1ny8bm98.

Full text
Abstract:
In the early years of World War II, German Navy used Enigma to encode messages and prevent their intelligence by Allies. This work considers advantages of stealing and technically decrypting the German Naval Enigma key during the Battle of Atlantic from 1940-41; while Allies had already succeeded in decrypting the German Army Enigma prior to the war. The complexities of Naval Enigma introduced new challenges. Yet British codebreakers persisted with technological decryption — an approach they adopted following their earlier successes. However, details embedded within Naval Enigma plus changes i
APA, Harvard, Vancouver, ISO, and other styles
7

Safitri, Sukmawati Indah, Muhammad Khudzaifah, and Mohammad Nafie Jauhari. "Penyandian Pesan Hybrid dengan Myszkowski Cipher dan Rivest, Shamir, Adleman (RSA)." Jurnal Riset Mahasiswa Matematika 2, no. 6 (2023): 214–20. http://dx.doi.org/10.18860/jrmm.v2i6.22017.

Full text
Abstract:
Classical and modern cryptography have advantages and disadvantages in securing text messages. Hybrid algorithms can combine two algorithms to produce a higher level of message security when compared to one type of algorithm. This study discusses a hybrid algorithm that combines Myszkowski Cipher and RSA. The purpose of this research is to obtain ciphertext that is more difficult to crack by cryptanalysis. The hybrid algorithm process is done by encrypting text messages with the Myszkowski Cipher algorithm then the key used in the Myszkowski Cipher algorithm are encrypted using the RSA algorit
APA, Harvard, Vancouver, ISO, and other styles
8

Patil, Vedika, Sakshi Jain, and Yogita Shah. "Secure Cryptography by Using Hash Application." Journal of Cyber Security in Computer System 1, no. 1 (2022): 18–24. http://dx.doi.org/10.46610/jcscs.2022.v01i01.002.

Full text
Abstract:
This project is basically design for ensuring security to all kinds of data format file such as pdf, text, images, audio, videos etc. This is carried out using various keys and hashing algorithm. This project basically helps the end user to protect his/her personal files from the unauthorized user and can also restrict its access to the limited people. This complete process is carried out in two methods that are encryption and decryption. Encryption process required varchar key while encryption the data file which convert the original file in to incomprehensible format. Further in decryption p
APA, Harvard, Vancouver, ISO, and other styles
9

Irwanto, Dola. "File Encryption and Decryption Using Algorithm Aes-128 Bit Based Website." MALCOM: Indonesian Journal of Machine Learning and Computer Science 4, no. 2 (2024): 670–77. http://dx.doi.org/10.57152/malcom.v4i2.1305.

Full text
Abstract:
Digital data security has become very important in the current information era. One way to maintain data security is to use encryption and decryption techniques. The Advanced Encryption Standard (AES) algorithm has been proven effective in protecting data with a high level of security. This research aims to implement the AES-128 bit algorithm for online file encryption and decryption via a website. The method used in this research includes developing a website that provides a user interface for uploading and encrypting files, as well as for decrypting files that have been previously encrypted.
APA, Harvard, Vancouver, ISO, and other styles
10

Liu, Bao Long, Hua Chen, and Yi Guo. "Encrypted XML Data Query Processing with Range Query." Applied Mechanics and Materials 65 (June 2011): 241–45. http://dx.doi.org/10.4028/www.scientific.net/amm.65.241.

Full text
Abstract:
Without decrypting the encrypted blocks, it is difficult to query encrypted XML data. Inspired by Query-Aware decryption scheme, the paper extends the scheme to support range query with value index. Value index is based on order preserving encryption. The testing results indicate that the proposed scheme can complete a correct query processing, and support range query.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Decryption"

1

Strand, Martin. "Verifiable Shuffled Decryption." Thesis, Norges teknisk-naturvitenskapelige universitet, Institutt for matematiske fag, 2013. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-21427.

Full text
Abstract:
We describe the Verifiable Shuffled Decryption problem, and present five solutions based on adapting several existing verifiable shuffles. All but one may have potential for implementation, the choice of which would depend on the required level of security and computational restrictions given by the available hardware.
APA, Harvard, Vancouver, ISO, and other styles
2

Burman, Annie. "Gendering decryption - decrypting gender : The gender discourse of labour at Bletchley Park 1939-1945." Thesis, Uppsala universitet, Historiska institutionen, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-201046.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Takagi, Tsuyoshi. "New public-key cryptosystems with fast decryption." Phd thesis, [S.l. : s.n.], 2001. http://deposit.ddb.de/cgi-bin/dokserv?idn=962729302.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Käck, Emil. "TLS Decryption in passive monitoring system with server private key." Thesis, Umeå universitet, Institutionen för datavetenskap, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-184490.

Full text
Abstract:
Many network operators need to be able to ensure that customers get the level of service they pay for. To avoid bandwidth and server performance bottlenecks, and easily troubleshoot network problems, the network providers need to be able to see what payload data is sent. Modern networks encrypt data when sending it between nodes that makes passive monitoring more complex. A prevalent encryption mechanism on an IP-based network is TLS that needs to be decrypted.                This article’s purpose is to check if it is possible to decrypt TLS traffic in a passive monitoring system with the ser
APA, Harvard, Vancouver, ISO, and other styles
5

Merz, Doug, and Bruce Maples. "Encrypt/Decrypt COMSEC Unit for Space-based Command and Telemetry Applications." International Foundation for Telemetering, 2003. http://hdl.handle.net/10150/605565.

Full text
Abstract:
International Telemetering Conference Proceedings / October 20-23, 2003 / Riviera Hotel and Convention Center, Las Vegas, Nevada<br>This paper describes the system-level architecture and design concept of a communications security (COMSEC) equipment intended for space-based low data rate (< 1 Mbps) command and telemetry applications. The COMSEC Unit is a stand-alone piece of equipment which provides decryption of uplink command and control information and encryption of downlink telemetry data. The system-level architecture is described followed by an overview of the digital design concepts
APA, Harvard, Vancouver, ISO, and other styles
6

Loban, H. "A VHDL Implemetation of the Advanced Encryption Standard." Thesis, NURE, MC&FPGA, 2019. https://mcfpga.nure.ua/conf/2019-mcfpga/10-35598-mcfpga-2019-014.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Greinsmark, Carl. "Ransomware." Thesis, Högskolan Kristianstad, Fakulteten för naturvetenskap, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:hkr:diva-20695.

Full text
Abstract:
This thesis researches different ransomwares, how we can stop them and how their threat vectors work. It is important to notice that when solving one ransomware doesn’t solve the next incoming one. In this thesis we investigate six different ransomwares that spread between 2016-2019. We investigate the encryption methods, the different threat vectors, infection spreading and how to prevent from them by doing a theoretical and practical study. The results show that after infection of a ransomware, it encrypts the data instantaneously on the system. Fortunately, to keep information safe there ar
APA, Harvard, Vancouver, ISO, and other styles
8

Samuel, David. "RFID security in door locks." Thesis, Linköping University, Department of Computer and Information Science, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-12186.

Full text
Abstract:
<p>Radio frequency identification, RFID is a technology that is used in many fields including locks. The unlimited access to the reader and the transponder has resulted in severe security weaknesses and made it possible to apply different attacks. To classify door locks as secure they must at least fulfil two main criteria: the first is the use of a challenge-response authentication protocol and the second is to deploy sophisticated and secure algorithms.</p><p>MiFare classic and KeeLoq are two widely applied technologies that are still in use in many security critical applications and are con
APA, Harvard, Vancouver, ISO, and other styles
9

Manteena, Rajender. "A VHDL Implemetation of the Advanced Encryption Standard-Rijndael Algorithm." Scholar Commons, 2004. https://scholarcommons.usf.edu/etd/1149.

Full text
Abstract:
The National Institute of Standards and Technology (NIST) has initiated a process to develop a Federal information Processing Standard (FIPS) for the Advanced Encryption Standard (AES), specifying an Advanced Encryption Algorithm to replace the Data Encryption standard (DES) the Expired in 1998. NIST has solicited candidate algorithms for inclusion in AES, resulting in fifteen official candidate algorithms of which Rijndael was chosen as the Advanced Encryption Standard. The Advanced Encryption Standard can be programmed in software or built with pure hardware. However Field Programmable Gate
APA, Harvard, Vancouver, ISO, and other styles
10

Kundur, Abhinay. "Digital and Analog Signal Encryption and Decryption in Mid RF Range Using Hybrid Acousto-Optic Chaos." University of Dayton / OhioLINK, 2012. http://rave.ohiolink.edu/etdc/view?acc_num=dayton1336100009.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Decryption"

1

Martínez-Guerra, Rafael, Juan Javier Montesinos-García, and Juan Pablo Flores-Flores. Encryption and Decryption Algorithms for Plain Text and Images using Fractional Calculus. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-20698-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Paulus, Max. Der Diskos von Phaistos: Ein Ansatz zu seiner Entschlüsselung / = The Phaistos disk : an approach to its decryption. 2nd ed. Verlag Dr. Kovac, 2017.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Paulus, Max. Der Diskos von Phaistos: Ein Ansatz zu seiner Entschlüsselung = The Phaistos disk : an approach to its decryption. Kovac, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Decryption. KJB Writing Services, 2023.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Decryption. KJB Writing Services, 2023.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Beardsley, Ian. Et Decryption. Lulu Press, Inc., 2016.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Marks, Philip. Decryption Engine. Independently Published, 2016.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Countdown to Decryption. Pandamoon Publishing, 2024.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Muniraj, Inbarasan, and John T. Sheridan. Optical Encryption and Decryption. SPIE, 2019. http://dx.doi.org/10.1117/3.2523506.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Decryption of Indus Scripts. Internet, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Decryption"

1

Weik, Martin H. "decryption." In Computer Science and Communications Dictionary. Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_4547.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Kaliski, Burt. "Decryption Exponent." In Encyclopedia of Cryptography and Security. Springer US, 2011. http://dx.doi.org/10.1007/978-1-4419-5906-5_400.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Mu, Yi, Vijay Varadharajan, and Khan Quac Nguyen. "Delegated Decryption." In Cryptography and Coding. Springer Berlin Heidelberg, 1999. http://dx.doi.org/10.1007/3-540-46665-7_30.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Kaliski, Burt. "Decryption Exponent." In Encyclopedia of Cryptography, Security and Privacy. Springer Nature Switzerland, 2025. https://doi.org/10.1007/978-3-030-71522-9_400.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Ryan, Mark D. "Making Decryption Accountable." In Security Protocols XXV. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-71075-4_11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Green, Matthew. "Secure Blind Decryption." In Public Key Cryptography – PKC 2011. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-19379-8_16.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Hassan, Nihad A. "Ransomware Decryption Tools." In Ransomware Revealed. Apress, 2019. http://dx.doi.org/10.1007/978-1-4842-4255-1_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Kävrestad, Joakim. "Decryption and Password Enforcing." In Fundamentals of Digital Forensics. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-96319-8_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Kävrestad, Joakim. "Decryption and Password Enforcing." In Fundamentals of Digital Forensics. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-38954-3_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Ohta, Kazuo. "Remarks on blind decryption." In Lecture Notes in Computer Science. Springer Berlin Heidelberg, 1998. http://dx.doi.org/10.1007/bfb0030413.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Decryption"

1

Mishra, Shreshtha, Ojusav Agarwal, and Sunil Kumar Patel. "Quantum Decryption using Shor’s Algorithm." In 2024 IEEE Pune Section International Conference (PuneCon). IEEE, 2024. https://doi.org/10.1109/punecon63413.2024.10895777.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Shah, Aaryak, Alok Kumar Kamal, and Neeraj. "Steganographic Encryption and Decryption Using Duality Preserving GANs." In 2024 IEEE 22nd International Conference on Industrial Informatics (INDIN). IEEE, 2024. https://doi.org/10.1109/indin58382.2024.10774348.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Kuppan, Ajith Kumar, Raviraj Bhat, and Uday Trivedi. "QUIC SNI decryption usefulness prediction using Machine Learning." In 2024 IEEE International Conference on Electronics, Computing and Communication Technologies (CONECCT). IEEE, 2024. http://dx.doi.org/10.1109/conecct62155.2024.10677263.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

V, Thanikaiselvan, Abilash P, Lingeswar C, et al. "Chaotic Audio Encryption and Decryption Using Logistic Map." In 2024 IEEE International Conference on Automatic Control and Intelligent Systems (I2CACIS). IEEE, 2024. http://dx.doi.org/10.1109/i2cacis61270.2024.10649629.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Amano, Hodaka, Keiji Shimada, Reika Suketomo, Ryosuke Matsumoto, and Takahiro Kodama. "Impact of AES-CTR Mode Modified QAM Symbol Block Cipher on Nonlinear Fiber-Optic Channels." In CLEO: Science and Innovations. Optica Publishing Group, 2024. http://dx.doi.org/10.1364/cleo_si.2024.sth3q.2.

Full text
Abstract:
In a 7-ch WDM transmission experiment spanning 2240 km with fiber nonlinearity effects, we employed AES-CTR mode corrected symbol block cipher for dual-polarized-QAM, showcasing penalty-free performance irrespective of encryption presence and rendering eavesdropper decryption challenging.
APA, Harvard, Vancouver, ISO, and other styles
6

Matsumoto, Ryosuke, and Takahiro Kodama. "High-Speed Quantum Noise Stream Cipher System Enabled by Optical Fiber-based Encryption and Low-Complexity Digital Decryption." In CLEO: Science and Innovations. Optica Publishing Group, 2024. http://dx.doi.org/10.1364/cleo_si.2024.sth3q.1.

Full text
Abstract:
We propose secure digital-coherent system utilizing high-speed encryption/decryption through fiber and simplified digital back propagation (DBP). Negligible penalty is observed by detecting 64-Gbaud 216-level PSK-like chipper signals through a 5-stage DBP with precise fiber parameters.
APA, Harvard, Vancouver, ISO, and other styles
7

Zivic, Natasa, Esad Kadusic, and Mirko Skrbic. "Mathematical optimization of decrypting algorithm for soft input decryption." In 2009 XXII International Symposium on Information, Communication and Automation Technologies (ICAT 2009). IEEE, 2009. http://dx.doi.org/10.1109/icat.2009.5348411.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Müller, Jens, Fabian Ising, Vladislav Mladenov, Christian Mainka, Sebastian Schinzel, and Jörg Schwenk. "Practical Decryption exFiltration." In CCS '19: 2019 ACM SIGSAC Conference on Computer and Communications Security. ACM, 2019. http://dx.doi.org/10.1145/3319535.3354214.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Kalaichelvi, V., and R. M. Chandrasekaran. "FSPAlgorithm for encryption/decryption." In 2008 International Conference on Computing, Communication and Networking (ICCCN). IEEE, 2008. http://dx.doi.org/10.1109/icccnet.2008.4787779.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Gahi, Youssef, Farid Bourennani, Mouhcine Guennoun, and Hussein T. Mouftah. "Blind decryption for cloud computing." In 2016 IEEE Symposium on Computers and Communication (ISCC). IEEE, 2016. http://dx.doi.org/10.1109/iscc.2016.7543875.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Decryption"

1

Negron, Melvin S. Study of the Hill Cipher Encryption/Decryption Algorithm. Defense Technical Information Center, 2012. http://dx.doi.org/10.21236/ada581720.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Dolmatov, V., ed. GOST 28147-89: Encryption, Decryption, and Message Authentication Code (MAC) Algorithms. RFC Editor, 2010. http://dx.doi.org/10.17487/rfc5830.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Fedoseev, O. N. Calculation of the coverage area based on GOOGLE EARTH satellite images (MAP PIXEL-decryption V1.1 ). Ailamazyan Program Systems Institute of Russian Academy of Sciences, 2024. http://dx.doi.org/10.12731/ofernio.2023.25277.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Everett, Martin. EU–US collaboration on quantum technologies. Royal Institute of International Affairs, 2021. http://dx.doi.org/10.55317/9781784134211.

Full text
Abstract:
The development of quantum technologies represents a significant scientific advance with the potential to benefit many. However, security concerns over quantum technologies in the fields of computing and communications – chiefly in relation to encryption and decryption – have limited international cooperation. Existing discussions between the EU and US on quantum technologies remain low key. However, closer partnerships in the sector are possible in basic scientific research and communications standards. In order to remain a relevant player in the advancement of quantum technology, EU-based re
APA, Harvard, Vancouver, ISO, and other styles
5

von Luckner, Clemens Graf, Carmen Reinhart, and Kenneth Rogoff. Decrypting New Age International Capital Flows. National Bureau of Economic Research, 2021. http://dx.doi.org/10.3386/w29337.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!