Principles, Systems and Applications of IP Telecommunications 2010
DOI: 10.1145/1941530.1941533
|View full text |Cite
|
Sign up to set email alerts
|

Hidden VoIP calling records from networking intermediaries

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2012
2012
2022
2022

Publication Types

Select...
4
1

Relationship

1
4

Authors

Journals

citations
Cited by 7 publications
(4 citation statements)
references
References 23 publications
0
4
0
Order By: Relevance
“…Later when u 3 and u 4 terminate their conversation, the adversary can observe the disappearance of the flows and thus knows that u 3 and u 4 have communicated before. This attack is quite straightforward and thus no experiments have been done in [59].…”
Section: Appear and Disappear Of Flows [59]mentioning
confidence: 99%
See 2 more Smart Citations
“…Later when u 3 and u 4 terminate their conversation, the adversary can observe the disappearance of the flows and thus knows that u 3 and u 4 have communicated before. This attack is quite straightforward and thus no experiments have been done in [59].…”
Section: Appear and Disappear Of Flows [59]mentioning
confidence: 99%
“…k-anonymity on a C/S architecture [59]: To address the problem in Sect. 4.3.5, we proposed a scheme to process k VoIP conversations as a batch on a C/S architecture [59].…”
Section: Achieving K-anonymitymentioning
confidence: 99%
See 1 more Smart Citation
“…Zhang and Berthold [86] discuss several passive traffic analysis attacks on VoIP systems. These attacks exploit both signaling and media flow information.…”
Section: D) Captchas and Puzzles (4 Items)mentioning
confidence: 99%