9,177 research outputs found

    A secure archive for Voice-over-IP conversations

    Full text link
    An efficient archive securing the integrity of VoIP-based two-party conversations is presented. The solution is based on chains of hashes and continuously chained electronic signatures. Security is concentrated in a single, efficient component, allowing for a detailed analysis.Comment: 9 pages, 2 figures. (C) ACM, (2006). This is the author's version of the work. It is posted here by permission of ACM for your personal use. Not for redistribution. The definitive version was published in Proceedings of VSW06, June, 2006, Berlin, German

    Mitigating Denial-of-Service Attacks on VoIP Environment

    Get PDF
    IP telephony refers to the use of Internet protocols to provide voice, video, and data in one integrated service over LANs, BNs, MANs, not WANs. VoIP provides three key benefits compared to traditional voice telephone services. First, it minimizes the need fro extra wiring in new buildings. Second, it provides easy movement of telephones and the ability of phone numbers to move with the individual. Finally, VoIP is generally cheaper to operate because it requires less network capacity to transmit the same voice telephone call over an increasingly digital telephone network (FitzGerald & Dennis, 2007 p. 519). Unfortunately, benefits of new electronic communications come with proportionate risks. Companies experience losses resulting from attacks on data networks. There are direct losses like economic theft, theft of trade secrets and digital data, as well as indirect losses that include loss of sales, loss of competitive advantage etc. The companies need to develop their security policies to protect their businesses. But the practice of information security has become more complex than ever. The research paper will be about the major DoS threats the company’s VoIP environment can experience as well as best countermeasures that can be used to prevent them and make the VoIP environment and, therefore, company’s networking environment more secure

    Economic FAQs About the Internet

    Get PDF
    This is a set of Frequently Asked Questions (and answers) about the economic, institutional, and technological structure of the Internet. We describe the history and current state of the Internet, discuss some of the pressing economic and regulatory problems, and speculate about future developments.Internet, telecommunications, congestion pricing, National Information Infrastructure

    Voice and Video Capacity of a Secure Wireless System

    Get PDF
    Improving the security and availability of secure wireless multimedia systems is the purpose of this thesis. Specifically, this thesis answered research questions about the capacity of wireless multimedia systems and how three variables relate to this capacity. The effects of securing the voice signal, real-time traffic originating foreign to a wireless local area network and use of an audio-only signal compared with a combined signal were all studied. The research questions were answered through a comprehensive literature review in addition to an experiment which had thirty-six subjects using a secure wireless multimedia system which was developed as part of this thesis effort. Additionally, questions related to the techniques for deploying wireless multimedia system including the maturity and security of the technology were answered. The research identified weaknesses in existing analytical and computer models and the need for a concise and realistic model of wireless multimedia systems. The culmination of this effort was the integration of an audio-video system with an existing research platform which is actively collecting data for the Logistics Readiness Branch of the Air Force Research Laboratory

    AICPA\u27s top technologies 2004

    Get PDF
    https://egrove.olemiss.edu/aicpa_guides/1588/thumbnail.jp

    When traditional advocacy goes high-tech

    Get PDF
    This thesis defines the essentials of activism and gives examples of online technology that can assist grassroots organizations in promoting positive change within their communities. I discuss existing online technologies that make it possible for grassroots organizations to enhance the traditional (non-Internet-based) approaches to activism. Online activism is a growing trend among non-profit organizations. Several online awards are given to organizations that have noticeably pursued online pursuit of electronic advocacy. From making telephone calls to organizing demonstrations, grassroots groups can begin saving money, time, and human resources. The Internet frees people from physical barriers and borders. I have investigated current online technologies that can be used to supplement traditional activism services. I give one example per approach that can be used online. The examples include self-education, promoting your organization\u27s message, successful online actions, information distribution, corporate utilization, and the future of online activism. Examples of activism in this report focus on non-violent advocacy or civil disobedience. I have researched online activism through the use of periodicals, books, World Wide Web Internet searches, and interviews with advocacy specialists. This report offers evidence that the Internet has changed, and will continue to change, the paradigm of political and social activism. By providing increased access using new, fast, and efficient technology, more people are able to have a greater say in shaping their worlds
    corecore