A randomized protocol for signing contracts
Communications of the ACM
Oblivious transfer and polynomial evaluation
STOC '99 Proceedings of the thirty-first annual ACM symposium on Theory of computing
Preserving privacy in web services
Proceedings of the 4th international workshop on Web information and data management
A Web-Based Negotiation Agent Using CBR
Revised Papers from the PRICAI 2000 Workshop Reader, Four Workshops held at PRICAI 2000 on Advances in Artificial Intelligence
How to Make Personalized Web Browising Simple, Secure, and Anonymous
FC '97 Proceedings of the First International Conference on Financial Cryptography
FOCS '00 Proceedings of the 41st Annual Symposium on Foundations of Computer Science
A logic to reason about likelihood
STOC '83 Proceedings of the fifteenth annual ACM symposium on Theory of computing
Bilateral E-services Negotiation Under Uncertainty
SAINT '03 Proceedings of the 2003 Symposium on Applications and the Internet
Personal and service mobility in ubiquitous computing environments: Research Articles
Wireless Communications & Mobile Computing - Special Issue: Mobility Management in Wireless and Mobile Networks
Protecting privacy during on-line trust negotiation
PET'02 Proceedings of the 2nd international conference on Privacy enhancing technologies
The cost of protecting privacy in multimedia applications
Proceedings of the 4th ACM symposium on QoS and security for wireless and mobile networks
Modeling and negotiating service quality
Service research challenges and solutions for the future internet
Hi-index | 0.00 |
Privacy violation is a serious and pressing problem for Internet users that requires immediate solution. This problem is very serious for applications that require the user's identity and QoS preferences like IP-telephony and videoconference applications. In this paper, we will identify the risks of privacy invasion during the setup of interactive multimedia applications, and introduce three schemes to solve the problem of protecting the user's privacy, with varying degree of complexities. The first approach is based on the use of a trusted third party; this has been a common approach for the Public Switched Telephony Network (PSTN). The second approach is based on the trust relationship between the communicating parties, and the third approach is based on primitives from the field of secure distributed computation