Author of the publication

Corporate focus versus diversification: the role of growth opportunities and cashflow

, , , and . Journal of International Financial Markets, Institutions and Money, 12 (3): 231--252 (July 2002)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Efficient ID Based Security Algorithm for Mutual Node Authentication and Key Management: An Elliptic Curve Cryptography Based Approach.. ICAA, volume 8321 of Lecture Notes in Computer Science, page 110-121. Springer, (2014)Performance Analysis of Secure Real-time Transport Protocol Using Elliptic Curves., , and . ISI, page 1-7. IEEE, (2020)Performance Analysis of Elliptic Curves for Real-Time Video Encryption., , , and . NCS, page 64-71. IEEE, (2018)An Efficient Approach to Develop an Intrusion Detection System Based on Multi Layer Backpropagation Neural Network Algorithm: IDS using BPNN Algorithm., , and . CPR, page 105-108. ACM, (2015)EW256357: A New Secure NIST P-256 Compatible Elliptic Curve for VoIP Applications' Security., , and . SecureComm (2), volume 336 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 291-310. Springer, (2020)Are fewer firms paying more dividends?: The international evidence, , and . Journal of Multinational Financial Management, 16 (4): 333--362 (October 2006)Performance Analysis of Elliptic Curves for VoIP Audio Encryption Using a Softphone., , and . SecureComm (1), volume 335 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 503-508. Springer, (2020)Corporate focus versus diversification: the role of growth opportunities and cashflow, , , and . Journal of International Financial Markets, Institutions and Money, 12 (3): 231--252 (July 2002)CAWS - Security Algorithms for Wireless Sensor Networks: A Cellular Automata Based Approach, and . CoRR, (2012)