{"@context":["https://w3id.org/fdo/context/v1",{"schema":"https://schema.org/","prov":"http://www.w3.org/ns/prov#","fdo":"https://w3id.org/fdo/vocabulary/"}],"@id":"https://fdo.portal.mardi4nfdi.de/fdo/Q4799862","@type":"DigitalObject","kernel":{"@id":"https://fdo.portal.mardi4nfdi.de/fdo/Q4799862","digitalObjectType":"https://schema.org/ScholarlyArticle","primaryIdentifier":"mardi:Q4799862","kernelVersion":"v1","immutable":true,"modified":"2025-04-19T15:07:41Z"},"profile":{"@context":"https://schema.org","@type":"ScholarlyArticle","@id":"https://portal.mardi4nfdi.de/entity/Q4799862","name":"A Liquidity-based Model of Security Design","headline":"A Liquidity-based Model of Security Design","description":"scientific article; zbMATH DE number 1889110","url":"https://portal.mardi4nfdi.de/entity/Q4799862","datePublished":"1999-00-00","author":[{"@id":"https://portal.mardi4nfdi.de/entity/Q281364"},{"@id":"https://portal.mardi4nfdi.de/entity/Q1308693"}],"publisher":[{"@id":"https://portal.mardi4nfdi.de/entity/Q58373"}],"identifier":{"@type":"PropertyValue","propertyID":"doi","value":"10.1111/1468-0262.00004","url":"https://doi.org/10.1111/1468-0262.00004"},"sameAs":["https://doi.org/10.1111/1468-0262.00004"]},"provenance":{"prov:generatedAtTime":"2025-04-19T15:07:41Z","prov:wasAttributedTo":"MaRDI Knowledge Graph"}}