Results 1 - 10
of
22
Internet Telephony Gateway Location
- Proc. Conf. Computer Comm. (IEEE Infocom), IEEE CS Press, Los Alamitos, Calif
, 1998
"... Although the Internet was designed to handle non-real time data traffic, it is being used increasingly to carry voice and video. One important class of contributors to this growth are Internet telephones. Critical to more widespread use of Internet telephony is smooth interoperability with the exist ..."
Abstract
-
Cited by 26 (5 self)
- Add to MetaCart
(Show Context)
Although the Internet was designed to handle non-real time data traffic, it is being used increasingly to carry voice and video. One important class of contributors to this growth are Internet telephones. Critical to more widespread use of Internet telephony is smooth interoperability with the existing telephone network. This interoperability comes through the use of Internet Telephony Gateway’s (ITG’s) which perform protocol translation between an IP network and the Public Switched Telephone Network (PSTN). In order for an IP host to call a user on the PSTN, the IP host must know the IP address of an appropriate gateway. We consider here the problem of finding these gateways. An analysis of a number of protocol architectures is presented, including hierarchical databases, multicast advertisement, routing protocols, and centralized databases. We propose a new protocol architecture, called Brokered Multicast Advertisements (BMA) which serves as a lightweight, scalable mechanism for locating ITG’s. The BMA architecure is general, and can be applied to location of any service across a wide area network. 1
Evaluating User Privacy in Bitcoin
"... Abstract. Bitcoin is quickly emerging as a popular digital payment system. However, in spite of its reliance on pseudonyms, Bitcoin raises a number of privacy concerns due to the fact that all of the transactions that take place are publicly announced in the system. In this paper, we investigate the ..."
Abstract
-
Cited by 11 (0 self)
- Add to MetaCart
Abstract. Bitcoin is quickly emerging as a popular digital payment system. However, in spite of its reliance on pseudonyms, Bitcoin raises a number of privacy concerns due to the fact that all of the transactions that take place are publicly announced in the system. In this paper, we investigate the privacy guarantees of Bitcoin in the setting where Bitcoin is used as a primary currency for the daily transactions of individuals. More specifically, we evaluate the privacy that is provided by Bitcoin (i) by analyzing the genuine Bitcoin system and (ii) through a simulator that faithfully mimics the operation of Bitcoin in the context where Bitcoin is used for all transactions within a university. In this setting, our results show that the profiles of almost 40 % of the users can be, to a large extent, recovered even when users adopt privacy measures recommended by Bitcoin. To the best of our knowledge, this is the first work that comprehensively analyzes, and evaluates the privacy implications of Bitcoin. As a by-product, we have designed and implemented the first simulator of Bitcoin; our simulator can be used to model the interaction between Bitcoin users in generic settings. 1
Distributed Algorithms and Protocols for Scalable Internet Telephony
, 2001
"... Internet telephony service is defined as the provision of real-time, interactive, multimedia telecom-munications services between human users, using the public Internet. The most difficult problem in providing Internet telephony is to overcome the increased jitter, delay, and loss (as compared to ci ..."
Abstract
-
Cited by 6 (0 self)
- Add to MetaCart
Internet telephony service is defined as the provision of real-time, interactive, multimedia telecom-munications services between human users, using the public Internet. The most difficult problem in providing Internet telephony is to overcome the increased jitter, delay, and loss (as compared to circuit-switched networks) suffered by voice. Past work has separately investigated Forward Error Correction (FEC) and playout buffer adaptation mech-anisms to resolve these problems. We show that these mechanisms must be considered jointly. We propose and simulate a number of algorithms for integrating FEC into playout buffer adaptation schemes, and show that they are superior to non-integrated algorithms. Receiving feedback about network transport quality is essential for supporting adaptive applications. We examine the issues surrounding scalability of transport feedback in large scale multicast groups. We present, analyze, and simulate a class of algorithms termed reconsideration, which support congestion controlled feedback in highly dynamic groups, and then show how the memory requirements of our algorithms can be reduced. We consider signaling protocols for providing call establishment, management, features, and applications. After an analysis of existing Internet telephony signaling protocols, we propose
Cashing up with mobile money: the fairCASH way, presented at Euro mGov
, 2006
"... Today we still do not have a widely available digital cash system for the masses. This is not because there are no inventions in this area or the money community is out of ideas on how to construct such a system. It is mainly because there are conflicts of interests between banks, government and com ..."
Abstract
-
Cited by 2 (1 self)
- Add to MetaCart
Today we still do not have a widely available digital cash system for the masses. This is not because there are no inventions in this area or the money community is out of ideas on how to construct such a system. It is mainly because there are conflicts of interests between banks, government and community. In this paper we first present a short history of money and look at these conflicts. Then we focus on the so-called success-factors, which are essential for a highly accepted e-Payment system. Based on these success-factors, we will present a new system called fairCASH. By adopting our fairCASH system, users will be able to make payments of any value, including micro payments. fairCASH is a multipurpose, multi-currency, pre-paid inter-operable scheme for domestic usage and cross border payments. It features non-account-related completely anonymous payment transactions by encrypting the transferred e-Tokens. There is no need of registration for users of the fairCASH e-Money system. It is suitable for person-to-person, chip-to-chip or P2P money transfers. It is independent of the communication platform or the digital transmission standard. Highlights are the inherent zero transaction costs for B2C, B2B and C2C operations. Last but not least, we would like to point out that the system posses the multi-hopping capability allowing e-Token circulation that is very advantages for users of such system. Keywords:
Light-weight Micro-Cash for the Internet
- ESORICS'96 Proceedings
, 1996
"... Abstract. We propose a micro-cash technique based on a one-time sig-nature scheme: signing a message more than once leads to disclosure of the signer's private key. In addition to usual cash properties such as off-fine bank for payment and spender's anonymity, the technique also provides a ..."
Abstract
-
Cited by 1 (0 self)
- Add to MetaCart
(Show Context)
Abstract. We propose a micro-cash technique based on a one-time sig-nature scheme: signing a message more than once leads to disclosure of the signer's private key. In addition to usual cash properties such as off-fine bank for payment and spender's anonymity, the technique also provides a number of useful features. These include: identifying double spender with strong proof, cash revocable for identified double spender, independent of using tamper-resistant devices, coin sub-divisible to smal-ler denominations, and system simplicity in terms of small-sized data for cash representation as well as simple protocols for cash withdrawal, pay-ment and deposit. We reason that these features support a lightweight cash system suitable for handling very low value payment transactions, such as information purchases on the Internet.
An Anonymous Credit Card System
"... Abstract. Credit cards have many important benefits; however, these same benefits often carry with them many privacy concerns. In particular, the need for users to be able to monitor their own transactions, as well as bank’s need to justify its payment requests from cardholders, entitle the latter t ..."
Abstract
-
Cited by 1 (0 self)
- Add to MetaCart
(Show Context)
Abstract. Credit cards have many important benefits; however, these same benefits often carry with them many privacy concerns. In particular, the need for users to be able to monitor their own transactions, as well as bank’s need to justify its payment requests from cardholders, entitle the latter to maintain a detailed log of all transactions its credit card customers were involved in. A bank can thus build a profile of each cardholder even without the latter’s consent. In this paper, we present a practical and accountable anonymous credit system based on ecash, with a privacy preserving mechanism for error correction and expense-reporting. 1
Intermediation ort Electronic Markets Journal of Intemational Information Management Intermediation on electronic markets: The case of Java software elements
"... This paper provides an introduction to the Java Repository- an intermediary for Java software elements. First, basic concepts for electronic intermediaries are derived from eco nomic theory. Furthermore, the theoretic considerations are applied to the Java Repository and current and future developme ..."
Abstract
- Add to MetaCart
This paper provides an introduction to the Java Repository- an intermediary for Java software elements. First, basic concepts for electronic intermediaries are derived from eco nomic theory. Furthermore, the theoretic considerations are applied to the Java Repository and current and future developments of this special intermediary are presented, especially the use and implementation ofEcash to support financial transactions on the Java market.
Save the Eart
"... Interview " You won't look at your beliefs in the same way again. nL ..."
Abstract
- Add to MetaCart
Interview " You won't look at your beliefs in the same way again. nL