Untraceable electronic mail, return addresses, and digital pseudonyms
Communications of the ACM
Location diversity in anonymity networks
Proceedings of the 2004 ACM workshop on Privacy in the electronic society
Security, Wiretapping, and the Internet
IEEE Security and Privacy
Providing Response Identity and Authentication in IP Telephony
ARES '06 Proceedings of the First International Conference on Availability, Reliability and Security
The Fourth Amendment and Emerging Communications Technologies
IEEE Security and Privacy
Designing the Right Wiretap Solution: Setting Standards under CALEA
IEEE Security and Privacy
VPN Analysis and New Perspective for Securing Voice over VPN Networks
ICNS '08 Proceedings of the Fourth International Conference on Networking and Services
Spot Me if You Can: Uncovering Spoken Phrases in Encrypted VoIP Conversations
SP '08 Proceedings of the 2008 IEEE Symposium on Security and Privacy
Preserving Caller Anonymity in Voice-over-IP Networks
SP '08 Proceedings of the 2008 IEEE Symposium on Security and Privacy
Identifying the use of data/voice/video-based P2P traffic by DNS-query behavior
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
Digital Investigation: The International Journal of Digital Forensics & Incident Response
Peer-to-peer networking issues-an overview
Digital Investigation: The International Journal of Digital Forensics & Incident Response
Ambiguities in US law for investigators
Digital Investigation: The International Journal of Digital Forensics & Incident Response
On the anonymity and traceability of peer-to-peer VoIP calls
IEEE Network: The Magazine of Global Internetworking
Hi-index | 0.00 |
With the evolution of increasingly sophisticated Internet communication technologies, ensuing legal and policy issues have also emerged. VoIP (voice-over-Internet Protocol) and P2P (peer-to-peer) file-sharing software are two relevant examples of the differing characteristics of Internet communications compared to traditional communication technologies, e.g., telephone, cell phone or client-and-server architecture, from the viewpoint of government surveillance (or the investigation of copyright infringement) and the protection of user privacy. Herein, we try to make observations and opinions regarding the legal issues related to VoIP and P2P file-sharing software.