scispace - formally typeset
Search or ask a question
Topic

Proxy (statistics)

About: Proxy (statistics) is a research topic. Over the lifetime, 5257 publications have been published within this topic receiving 94504 citations. The topic is also known as: proxy variable & proxy measurement.


Papers
More filters
Journal ArticleDOI
Robert W. Faff1
TL;DR: This paper used Frank Russell style portfolios to create useful proxies for the Fama and French (1992) factors and found that the proxy-mimicking portfolios represent a pervasive source of exposure across U.S. industry portfolios and to generally possess similar properties to those utilized in the finance literature.
Abstract: This paper utilizes Frank Russell style portfolios to create useful proxies for the Fama and French (1992) factors. The proxy-mimicking portfolios are shown to represent a pervasive source of exposure across U.S. industry portfolios and to generally possess similar properties to those utilized in the finance literature. Further, a set of multivariate asset-pricing tests of the three-factor Fama and French asset-pricing (FF) model based on the proxy factors fails to reject the model. However, these tests do not reveal strong evidence of significantly positive risk premiums, particularly in the case of the size and book-to-market factors.

55 citations

Journal ArticleDOI
James R. Vanbeek1
TL;DR: In this paper, the authors test the hypothesis that removing the reelection constraint on congres-sional representatives will alter their voting behavior by implementing timing variables to indicate when the decision to retire occurs.
Abstract: This article tests the hypothesis that removing the reelection constraint on congres-sional representatives will alter their voting behavior. This article uses 1977 and 1978 congressional voting records to determine residuals that are taken as a proxy for shirking. The contribution of this article is to test the hypothesis by implementing timing variables to indicate when the decision to retire occurs. Despite many different tests of the hypothesis, there is no evidence that removing the reelection constraint actually causes a change in representatives' voting behavior when they do vote.

55 citations

Journal ArticleDOI
Mirae Kim1
TL;DR: The link between financial indicators and program outcomes has been largely unexamined as mentioned in this paper, but the link between the two metrics has been examined in the context of nonprofit organizations' capacity to serve.
Abstract: Financial measures are routinely used as a proxy for nonprofit organizations’ capacity to serve, but the link between financial indicators and program outcomes has been largely unexamined. This stu...

55 citations

Journal ArticleDOI
TL;DR: This paper formalizes the notion of anonymous ciphertext-policy attribute-based proxy re-encryption anonymous CP-ABPRE and proposes a novel technique called match-then-re-encrypt, in which a matching phase is additionally introduced before the re- Encryption phase.
Abstract: As a public key cryptographic primitive, attribute-based encryption ABE is promising in implementing fine-grained access control in cloud computing. However, before ABE comes into practical applications, two challenging issues have to be addressed, that is, users' attribute privacy protection and access policy update. In this paper, we tackle the aforementioned challenge for the first time by formalizing the notion of anonymous ciphertext-policy attribute-based proxy re-encryption anonymous CP-ABPRE and giving out a concrete construction. We propose a novel technique called match-then-re-encrypt, in which a matching phase is additionally introduced before the re-encryption phase. This technique uses special components of the proxy re-encryption key and ciphertext to anonymously check whether the proxy can fulfill a proxy re-encryption or not. Theoretical analysis and simulation results demonstrate that our anonymous CP-ABPRE scheme is secure and efficient. Copyright © 2016 John Wiley & Sons, Ltd.

55 citations

Proceedings ArticleDOI
10 Nov 2003
TL;DR: In this scheme, an original signer nominates a person as signature receiver when he delegates his signing capability to aproxy signer, and the proxy signer can generate valid proxy signature on behalf of the original signers which none but the nominated receiver can verify and accept, thus the misuse of proxy signature is avoided.
Abstract: Proxy signature is the solution to delegation of signing capabilities in electronic world. Proxy signatures are signature schemes that an original signer delegates his signing capability to a proxy signer, and the proxy signer creates signatures on behalf of the original signer. To avoid the misuse of proxy signatures, the original signer hopes that he can restrict the signing capability delegated to the proxy signers. In this paper, a designated-receiver proxy signature scheme is proposed. In this scheme, an original signer nominates a person as signature receiver when he delegates his signing capability to a proxy signer, and the proxy signer can generate valid proxy signature on behalf of the original signer which none but the nominated receiver can verify and accept, thus the misuse of proxy signature is avoided. The security of the proposed signature scheme is analyzed. The scheme will be applied in e/spl I.bar/commerce and other fields.

55 citations


Performance
Metrics
No. of papers in the topic in previous years
YearPapers
20231,242
20222,473
2021334
2020262
2019250
2018282