13 research outputs found

    Corporate Financial Distress of Industry Level Listings in an Emerging Market

    Get PDF
    Any critical analysis of the corporate financial distress of listed firms in international exchange would be incomplete without a serious dissection at the industry level because of the different levels of risks concerned. This paper considers the financial distress of listed firms at the industry level in Vietnam over the last decade. Two periods are considered, namely during the Global Financial Crisis (GFC) (2007 - 2009) and post-GFC (2010 - 2017). The logit regression technique is used to estimate alternative models based on accounting and market factors. The paper also extends the analysis to include selected macroeconomic factors that are expected to affect the corporate financial distress of listed firms at the industry level in Vietnam. The empirical findings confirm that the corporate financial distress prediction model, which includes accounting factors with macroeconomic indicators, performs much better than alternative models. In addition, the evidence confirms that the GFC had a damaging impact on each sector, with the Health & Education sector demonstrating the most impressive recovery post-GFC, and the Utilities sector recording a dramatic increase in bankruptcies post-GF

    Generic Construction of Hybrid Public Key Traitor Tracing with Full-Public-Traceability

    Full text link
    Abstract. In Eurocrypt 2005, Chabanne, Phan and Pointcheval introduced an interesting property for traitor tracing schemes called public traceability, which makes tracing a black-box public operation. However, their proposed scheme only worked for two users and an open question proposed by authors was to provide this property for multi-user systems. In this paper, we give a comprehensive solution to this problem by giving a generic construction for a hybrid traitor tracing scheme that provides full-public-traceability. We follow the Tag KEM/DEM paradigm of hybrid encryption systems and extend it to multi-receiver scenario. We define Tag-BroadcastKEM/DEM and construct a secure Tag-BroadcastKEM from a CCA secure PKE and target-collision resistant hash function. We will then use this Tag-BroadcastKEM together with a semantically secure DEM to give a generic construction for Hybrid Public Key Broadcast Encryption. The scheme has a black box tracing algorithm that always correctly identifies a traitor. The hybrid structure makes the system very efficient, both in terms of computation and communication cost. Finally we show a method of reducing the communication cost by using codes with identifiable parent property.

    Child Melioidosis Deaths Caused by Burkholderia pseudomallei–Contaminated Borehole Water, Vietnam, 2019

    No full text
    Within 8 months, 3 children from 1 family in northern Vietnam died from melioidosis. Burkholderia pseudomallei of the same sequence type, 541, was isolated from clinical samples, borehole water, and garden and rice field soil. Boreholes should be properly constructed and maintained to avoid B. pseudomallei contamination
    corecore