A Survey of Voice over IP Security Research
ICISS '09 Proceedings of the 5th International Conference on Information Systems Security
Traffic classification using visual motifs: an empirical evaluation
Proceedings of the Seventh International Symposium on Visualization for Cyber Security
Proceedings of the 17th ACM conference on Computer and communications security
Fingerprinting websites using remote traffic analysis
Proceedings of the 17th ACM conference on Computer and communications security
Uncovering Spoken Phrases in Encrypted Voice over IP Conversations
ACM Transactions on Information and System Security (TISSEC)
Drac: an architecture for anonymous low-volume communications
PETS'10 Proceedings of the 10th international conference on Privacy enhancing technologies
Speaker recognition in encrypted voice streams
ESORICS'10 Proceedings of the 15th European conference on Research in computer security
Hidden VoIP calling records from networking intermediaries
Principles, Systems and Applications of IP Telecommunications
On privacy leakage through silence suppression
ISC'10 Proceedings of the 13th international conference on Information security
Exposing the lack of privacy in file hosting services
LEET'11 Proceedings of the 4th USENIX conference on Large-scale exploits and emergent threats
Traffic analysis attacks on Skype VoIP calls
Computer Communications
Inferring users' online activities through traffic analysis
Proceedings of the fourth ACM conference on Wireless network security
Website fingerprinting in onion routing based anonymization networks
Proceedings of the 10th annual ACM workshop on Privacy in the electronic society
Detecting near-duplicate SPITs in voice mailboxes using hashes
ISC'11 Proceedings of the 14th international conference on Information security
Peer-to-Peer VoIP communications using anonymisation overlay networks
CMS'10 Proceedings of the 11th IFIP TC 6/TC 11 international conference on Communications and Multimedia Security
Tag size does matter: attacks and proofs for the TLS record protocol
ASIACRYPT'11 Proceedings of the 17th international conference on The Theory and Application of Cryptology and Information Security
Private communication detection: a stochastic approach
Proceedings of the fifth ACM conference on Security and Privacy in Wireless and Mobile Networks
Speaker recognition from encrypted VoIP communications
Digital Investigation: The International Journal of Digital Forensics & Incident Response
Speaker verification from partially encrypted compressed speech for forensic investigation
Digital Investigation: The International Journal of Digital Forensics & Incident Response
An overview of VoIP and P2P copyright and lawful-interception issues in the United States and Taiwan
Digital Investigation: The International Journal of Digital Forensics & Incident Response
Website detection using remote traffic analysis
PETS'12 Proceedings of the 12th international conference on Privacy Enhancing Technologies
A new cell-counting-based attack against Tor
IEEE/ACM Transactions on Networking (TON)
Privacy risks in named data networking: what is the cost of performance?
ACM SIGCOMM Computer Communication Review
SkypeMorph: protocol obfuscation for Tor bridges
Proceedings of the 2012 ACM conference on Computer and communications security
Who do you sync you are?: smartphone fingerprinting via application behaviour
Proceedings of the sixth ACM conference on Security and privacy in wireless and mobile networks
Implementing side-channel attacks on suggest boxes in web applications
Proceedings of the First International Conference on Security of Internet of Things
Cover your ACKs: pitfalls of covert channel censorship circumvention
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security
Wiretap-proof: what they hear is not what you speak, and what you speak they do not hear
Proceedings of the 4th ACM conference on Data and application security and privacy
Hi-index | 0.00 |
The problem of security against timing based traffic analysis in multihop networks is considered in this work. In particular, the relationship between the level of anonymity provided and the quality of service, as measured by network latency, is analyzed ...