Impersonation attacks in wireless and mobile networks by professional criminal groups are becoming more sophisticated. We confirm with simple risk analysis that impersonation atta...
This paper develops a simple model that explores the extent to which differences in connectivity quality can be effective incentives (or disincentives) towards migrating to an IPv...
In this note, we discuss issues pertaining to end-to-end qualityof-service management of commodity Internet applications and associated pricing incentive mechanisms. The issue of ...
Tor, a distributed Internet anonymizing system, relies on volunteers who run dedicated relays. Other than altruism, these volunteers have no incentive to run relays, causing a lar...
Due to a lack of incentives, Internet peerings are a notorious bandwidth bottleneck. Through the use of direct interconnection and content delivery networks, content providers are...