504 research outputs found

    Linearity and stationarity of G7 government bond returns

    Get PDF
    This study investigates the linearity and stationarity properties of government bond returns for the G7 economies. Our results from Luukkonen et al. (1988) linearity test reveal the nonlinear nature of all of the G7 bond returns. Furthermore, we had determined that they are stationary by the Kapetanios et al. (2003) nonlinear unit root test. In sum, it can be concluded that G7 government bond returns are stationary but possess a nonlinear feature. Our findings provide useful information for researchers interested in bond markets.government bond returns, G7, nonlinear, linearity, stationarity

    Does the US IT stock market dominate other IT stock markets: Evidence from multivariate GARCH model

    Get PDF
    Utilizing multivariate GARCH framework, this study finds that generally the US Information Technology (IT) market contributes a strong volatility rather than mean spillover effect to non-US IT markets, implying that the US IT market plays a dominant role in affecting the volatility of world IT markets. However, our further analysis of the dynamic path of correlation coefficients reveals that the strong relationship between US and non-US IT markets had weakened after the burst of the IT bubble.

    Linearity and stationarity of G7 government bond returns

    Get PDF
    This study investigates the linearity and stationarity properties of government bond returns for the G7 economies. Our results from Luukkonen et al. (1988) linearity test reveal the nonlinear nature of all of the G7 bond returns. Furthermore, we had determined that they are stationary by the Kapetanios et al. (2003) nonlinear unit root test. In sum, it can be concluded that G7 government bond returns are stationary but possess a nonlinear feature. Our findings provide useful information for researchers interested in bond markets.government bond returns; G7; linearity, stationarity; nonlinear

    Dense-Coding Attack on Three-Party Quantum Key Distribution Protocols

    Full text link
    Cryptanalysis is an important branch in the study of cryptography, including both the classical cryptography and the quantum one. In this paper we analyze the security of two three-party quantum key distribution protocols (QKDPs) proposed recently, and point out that they are susceptible to a simple and effective attack, i.e. the dense-coding attack. It is shown that the eavesdropper Eve can totally obtain the session key by sending entangled qubits as the fake signal to Alice and performing collective measurements after Alice's encoding. The attack process is just like a dense-coding communication between Eve and Alice, where a special measurement basis is employed. Furthermore, this attack does not introduce any errors to the transmitted information and consequently will not be discovered by Alice and Bob. The attack strategy is described in detail and a proof for its correctness is given. At last, the root of this insecurity and a possible way to improve these protocols are discussed.Comment: 6 pages, 3 figure

    Essays on Segmentation of Chinese Stock Markets: Nonlinear Analyses

    Get PDF
    Ph.DDOCTOR OF PHILOSOPH
    corecore