Filters








122 Hits in 4.0 sec

Micropayments: an idea whose time has passed twice?

M. Lesk
2004 IEEE Security and Privacy  
People could buy magazines article by article, or music a bar at a time, if they wanted. In 1998, Jakob Nielsen wrote that "most Micropayments: An Idea Whose Time Has Passed Twice?  ...  Instead of selling an object you can use, pass on, resell at a flea market, or whatever, they want to sell you the right to see or hear the object in some limited place or time, imposing a further transaction  ... 
doi:10.1109/msecp.2004.1264856 fatcat:ov6645m2oraq7d3ixieiulklja

Randpay: The Technology for Blockchain Micropayments and Transactions Which Require Recipient's Consent [article]

Oleksii Konashevych, Oleg Khovayko
2020 arXiv   pre-print
The paper offers an API description, an analysis of the mathematical model, and proof of how "lottery" can be beneficial. There is also an attack analysis and overview of existing solutions.  ...  Rivest and published in the paper "Electronic Lottery Tickets as Micropayments" (1997).  ...  In [14] Hu and Zhang proposed to improve Pass and Shelat protocol by setting up a time-locked deposit, whose secure utilization is assured by the security of a primitive called accountable assertions  ... 
arXiv:1912.00007v3 fatcat:yrrqro5pazff5kgwq5hu5tthxe

A Performance Comparison of Java Cards for Micropayment Implementation [chapter]

Jordi Castellà-Roca, Josep Domingo-Ferrer, Jordi Herrera-Joancomartí, Jordi Planes
2000 Smart Card Research and Advanced Applications  
With the development of pay-per-view and multimedia streaming services, there is an increasing demand for practical micropayment mechanisms.  ...  Smart cards are essential to implement micropayments on the buyer's side. This paper presents a comparative analysis of four commercial Java Cards for micropayment implementation.  ...  Each coupon has the same fixed value v. Before the first micropayment, the buyer sends To to the merchant together with the value v in an authenticated manner.  ... 
doi:10.1007/978-0-387-35528-3_2 fatcat:mr2frmqka5dg3ogfhydf3akftu

Survey of Consensus Protocols [article]

Abdul Wahab, Waqas Mehmood
2018 arXiv   pre-print
Distributed ledger technology has gained wide popularity and adoption since the emergence of bitcoin in 2008 which is based on proof of work (PoW).  ...  ] as an alternate idea to make a resource scared whose usage otherwise can be abused.  ...  The first validator, whose finishes the waiting time (who has the shortest waiting time), creates and publishes his block on the network.  ... 
arXiv:1810.03357v2 fatcat:yjpcbkxwcfgmxka5bxgxjyevea

Opportunities and Risks of Blockchain Technologies (Dagstuhl Seminar 17132)

Roman Beck, Christian Becker, Juho Lindman, Matti Rossi, Marc Herbstritt
2017 Dagstuhl Reports  
Yet more than 60 years has passed and MT still has not delivered. MT is better than it once was, but it is not faithful.  ...  All the developers share their ideas and code enhancements through an online forum named "Bitcointalk.org".  ...  It would also require some type of hardware solution integration to follow freights in real-time.  ... 
doi:10.4230/dagrep.7.3.99 dblp:journals/dagstuhl-reports/BeckBLR17 fatcat:yrm7twr3bnhsppztnxg66uj27m

WiFi access point pricing as a dynamic game

J. Musacchio, J. Walrand
2006 IEEE/ACM Transactions on Networking  
We also study an expanded game where an access point sells to a reseller, which in turn sells to a mobile client and show that if the client has a web browser utility function, that constant price is a  ...  We find that if a client has a web browser utility function (a temporal utility function that grows linearly), it is a Nash equilibrium for the provider to charge the client a constant price per unit time  ...  The networking community has also focused a lot of attention on pricing ideas in recent years.  ... 
doi:10.1109/tnet.2006.872553 fatcat:ul4tfaaakrfg7ahvd52aozkuum

Blockchain-based P2P File Sharing Incentive [article]

Qingzhao Zhang, Yijun Leng, Lei Fan
2018 IACR Cryptology ePrint Archive  
Lightning network [4] implement the Hashed Time-Locked Contract (HTLC), which is an implementation of two-party micropayment channel, to leverage fast off-chain transactions.  ...  The basic idea of selfish mining is to develop a private chain containing more than one block and broadcast multiple blocks at one time [16] .  ... 
dblp:journals/iacr/ZhangLF18 fatcat:2rjyedfv4rafnp5sd5upjx2y5y

The Electronification of Transit Fare Payments: A Look at The Southeastern Pennsylvania Transportation Authority's New Payment Technologies Project

Philip Lehman Keitel
2009 Social Science Research Network  
been posited by payment industry executives, is that simply not enough time has passed for critical mass to build and for merchants to put in place terminals that accept contactless cards.  ...  Consumer Electronic Payments Behavior: Adoption of Bankcard-Linked Prepaid Models and Micropayments Kane argued that specific consumer payments behavior has been influential in the movement to electronic  ... 
doi:10.2139/ssrn.1540127 fatcat:yz37c6zndngejdxlza6d74maqq

New economic models for U.S. journalism

Robert H. Giles
2010 Daedalus  
Ganter is a prototype of the new entrepreneurial journalist: an award-winning broadcast reporter, writer, and pho-tojournalist whose work has appeared in major magazines and newspapers and on television  ...  Other ideas are being imag-ined, researched, discussed, and debated; some will surely be tested in real time.  ... 
doi:10.1162/daed.2010.139.2.26 fatcat:fvgzloz6sjc6tgbgo3zlnhd5di

Cyptocurrencies: development and impact on the world economy

2022 Journal of business and entrepreneurial studies  
analyzed and studied for the realization of the article were the definitions, history, advantages, disadvantages, characteristics among other variables in order to meet the objective and have a clearer idea  ...  The emergence of cryptocurrencies has meant the appearance of what we would call an asset and which has currency characteristics.  ...  The bitcoin has become an investment and speculation asset. (Espinoza et al., 2021) .  ... 
doi:10.37956/jbes.v6i3.296 fatcat:5b6zqsjb2zfpnalguv5uhx4dpm

FairNet – How to Counter Free Riding in Peer-to-Peer Data Structures [chapter]

Erik Buchmann, Klemens Böhm
2004 Lecture Notes in Computer Science  
Feedback is distributed in a swarm-like fashion and expires after a certain period of time. In extreme situations, the CAN asks nodes to perform a proof of work.  ...  A valid Feedback object is one that has passed the rules from Subsection 4.4. Method forwardMessage ( Figure 5 ) is responsible for sending messages to appropriate peers.  ...  A proof of work 3 also leads to an additional pair of messages. This experiment uses 2,000,000 queries whose keys are uniformly distributed.  ... 
doi:10.1007/978-3-540-30468-5_22 fatcat:gij4xltlx5dgvkuitbn6sbs4ca

Robit

Azarias Reda, Quang Duong, Timur Alperovich, Brian Noble, Yidnekachew Haile
2010 Proceedings of the 4th ACM/IEEE International Conference on Information and Communication Technologies and Development - ICTD '10  
Electronic commerce has forever changed how people trade goods and services. Last year alone, US consumers spent more than $150 billion dollars on internet sales [5] .  ...  We also describe an in-country user study and a small pilot deployment for proof-of-concept.  ...  While a voice description will not replace pictures, video or an in-person visit, it suffices to give the buyer a good idea about the item.  ... 
doi:10.1145/2369220.2369257 fatcat:pgk4hiqcfza7fdzl4ny25bvzpi

MRD Hashing [chapter]

Rei Safavi-Naini, Shahram Bakhtiari, Chris Charnes
1998 Lecture Notes in Computer Science  
We place an electronic version of this journal in the public domain one year after publication.  ...  Shamir 3-pass scheme.  ...  This has meant that practitioners of the art have spent an increasing portion of their time explaining the basics to people such as lawyers, politicians and journalists.  ... 
doi:10.1007/3-540-69710-1_10 fatcat:mezaspbmk5c4nhu227gayoeejq

A Novel Charging and Accounting Scheme in Mobile Ad-Hoc Networks

Inna Kofman, Nurul Huda
2016 International journal of network security and its applications  
Such an incentive-based scheme requires a charging and accounting framework to control and manage rewards and fines (collected from users committing infractions).  ...  The general idea of these schemes is as follows: an intermediate endsystem forwards a packet only if the sender has a good reputation.  ...  A PN can recognize when a packet has not been forwarded by an intermediate node, in accordance with the routing time.  ... 
doi:10.5121/ijnsa.2016.8203 fatcat:fkiz633n7vhfto6jr432bnz4oq

The Complementarity of Crowdsourced Dictionaries and Professional Dictionaries viewed through the Filter of Neology

Franck Sajous, Amélie Josselin-Leray, Nabil Hathout
2017 Lexis: Journal in English Lexicology  
Since the dictionary does not have an entry for the second term, the reader has no idea whether it is derogatory or not.  ...  First, juxtaposing sport and utility can be considered as an oxymoron (and French speakers, by whom SUV has been borrowed, usually have no idea what the abbreviation stands for).  ... 
doi:10.4000/lexis.2322 fatcat:ekysnnlbzbd7tau47xoc5zbih4
« Previous Showing results 1 — 15 out of 122 results