2017 9th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT) 2017
DOI: 10.1109/icumt.2017.8255174
|View full text |Cite
|
Sign up to set email alerts
|

Reducing call blocking rates for anonymous voice over IP communications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
3
1

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(4 citation statements)
references
References 18 publications
0
4
0
Order By: Relevance
“…Prior efforts on anonymous calling [7,13,22,38] unanimously agree with aforementioned shortcomings of Tor. Some conclude this based on potentially biased results [36], involving relays only in Europe or only conducted a few hundred calls [13], lacking diversity.…”
Section: Introductionmentioning
confidence: 89%
See 1 more Smart Citation
“…Prior efforts on anonymous calling [7,13,22,38] unanimously agree with aforementioned shortcomings of Tor. Some conclude this based on potentially biased results [36], involving relays only in Europe or only conducted a few hundred calls [13], lacking diversity.…”
Section: Introductionmentioning
confidence: 89%
“…Overall, a major hindrance in the wide-scale adoption (and availability) of such systems, is the recruitment of new volunteered relays and users (which Tor already has in abundance). Schatz et al [38] also highlight this issue. Additionally, as previously mentioned, prior evaluations over Tor, provide very few insights as to how the interplay of network performance attributes affects the voice call quality.…”
Section: Prior Effortsmentioning
confidence: 97%
“…Schatz et al [18] improve another aspect of Herd: Instead of using a full mesh for static padding, they suggest to pad fewer links in total. Due to the statistical multiplexing gain, more active calls can be supported (fewer calls are blocked due to saturated links).…”
Section: Related Workmentioning
confidence: 99%
“…subject to constraints (1) -( 8) and ( 16) (18) Our rationale for being more "greedy" here is to compensate for the additional delays introduced by the de-jitter buffers. Again, the latency of the entry and rendezvous links is not modeled.…”
Section: 35mentioning
confidence: 99%