2016
DOI: 10.1002/wcm.2725
|View full text |Cite
|
Sign up to set email alerts
|

Using group anonymity to hide the identity of VoIP mobile users communicating over hybrid networks while preserving quality of service

Abstract: Security and privacy have become critical in computer networks, especially with the emergence of E-commerce. Other than securing the transfer of data, users are interested in protecting their profile privacy against exposure attacks. Multimedia communications are at the core of new information and communication technologies. We seek to achieve end users' profile privacy without violating the Quality of Service constraints on the throughput, end-to-end delay, and jitter, as these parameters represent the critic… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2018
2018
2018
2018

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 44 publications
(42 reference statements)
0
1
0
Order By: Relevance
“…Sabra et al [176] exploited the concept of clusterheads with the aim to protect users' privacy. The authors considered a model with 2 different clusterheads which communicate directly.…”
Section: Machine Learning Techniquesmentioning
confidence: 99%
“…Sabra et al [176] exploited the concept of clusterheads with the aim to protect users' privacy. The authors considered a model with 2 different clusterheads which communicate directly.…”
Section: Machine Learning Techniquesmentioning
confidence: 99%