메뉴 건너뛰기




Volumn , Issue , 2008, Pages 50-63

Preserving caller anonymity in voice-over-IP networks

Author keywords

[No Author keywords available]

Indexed keywords

CANNING; INTERNET PROTOCOLS; INTERNET TELEPHONY; LAWS AND LEGISLATION; NETWORK PROTOCOLS; PROBABILITY; RANDOM PROCESSES; RISK ASSESSMENT; TELECOMMUNICATION SYSTEMS; TELEPHONE SYSTEMS; VOICE/DATA COMMUNICATION SYSTEMS; WIRELESS SENSOR NETWORKS;

EID: 50249106959     PISSN: 10816011     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SP.2008.10     Document Type: Conference Paper
Times cited : (11)

References (38)
  • 4
    • 50249102748 scopus 로고    scopus 로고
    • Phex client. http://www.phex.org.
    • Phex client
  • 5
    • 50249092720 scopus 로고    scopus 로고
    • Skype, the global internet telephone company
    • Skype - the global internet telephone company. http://www.skype.com.
  • 6
    • 50249139613 scopus 로고    scopus 로고
    • Telegeography research
    • Telegeography research. http://www.telegeography.com.
  • 9
    • 33745802064 scopus 로고    scopus 로고
    • Detection of interactive stepping stones: Algorithms and confidence bounds
    • A. Blum, D. Song, and S. Venkataraman. Detection of interactive stepping stones: Algorithms and confidence bounds. In 7th RAID, 2004.
    • (2004) 7th RAID
    • Blum, A.1    Song, D.2    Venkataraman, S.3
  • 10
    • 0019532104 scopus 로고
    • Untraceable electronic mail, return addresses, and digital pseudonyms
    • D. Chaum. Untraceable electronic mail, return addresses, and digital pseudonyms. In Communications of ACM, 24(2): 84-88, 1981.
    • (1981) Communications of ACM , vol.24 , Issue.2 , pp. 84-88
    • Chaum, D.1
  • 11
    • 33748618417 scopus 로고    scopus 로고
    • An exact algorithm for statistical shortest path problem
    • L. Deng and M. D. F. Wong. An exact algorithm for statistical shortest path problem. In Design Automation Conference, 2006.
    • (2006) Design Automation Conference
    • Deng, L.1    Wong, M.D.F.2
  • 13
    • 18744391788 scopus 로고    scopus 로고
    • Multiscale stepping stone detection: Detecting pairs of jittered interactive streams by exploiting maximum tolerable delay
    • D. L. Donoho, A. G. Flesia, U. Shankar, V. Paxson, J. Coit, and S. Staniford. Multiscale stepping stone detection: Detecting pairs of jittered interactive streams by exploiting maximum tolerable delay. In 5th RAID, 2002.
    • (2002) 5th RAID
    • Donoho, D.L.1    Flesia, A.G.2    Shankar, U.3    Paxson, V.4    Coit, J.5    Staniford, S.6
  • 16
    • 0038349207 scopus 로고    scopus 로고
    • Tarzan: A peer-to-peer anonymizing network layer
    • M. J. Freedman and R. Morris. Tarzan: A peer-to-peer anonymizing network layer. In 9th ACM CCS, 2002.
    • (2002) 9th ACM CCS
    • Freedman, M.J.1    Morris, R.2
  • 17
    • 0005063385 scopus 로고    scopus 로고
    • Onion routing for anonymous and private internet connections
    • D. Goldschlag, M. Reed, and P. Syverson. Onion routing for anonymous and private internet connections. In Communications of ACM, Vol 42(2), 1999.
    • (1999) Communications of ACM , vol.42 , Issue.2
    • Goldschlag, D.1    Reed, M.2    Syverson, P.3
  • 18
    • 85018204196 scopus 로고    scopus 로고
    • Anonymous usage of location-based services through spatial and temporal cloaking
    • M. Gruteser and D. Grunwald. Anonymous usage of location-based services through spatial and temporal cloaking. In ACM MobiSys, 2003.
    • (2003) ACM MobiSys
    • Gruteser, M.1    Grunwald, D.2
  • 20
    • 50249139612 scopus 로고    scopus 로고
    • Enhancing source location privacy in sensor network routing
    • P. Kamat, Y. Zhang, W. Trappe, and C. Ozturk. Enhancing source location privacy in sensor network routing. In IEEE ICDCS, 2005.
    • (2005) IEEE ICDCS
    • Kamat, P.1    Zhang, Y.2    Trappe, W.3    Ozturk, C.4
  • 21
    • 0003663467 scopus 로고    scopus 로고
    • Probability, random variables, and stochastic processes
    • A. Papoulis. Probability, random variables, and stochastic processes. In 3rd ed. McGraw Hill ISBN 0-07-100870-5, pp. 113-114.
    • 3rd ed. McGraw Hill ISBN 0-07-100870-5 , pp. 113-114
    • Papoulis, A.1
  • 22
    • 50249165346 scopus 로고    scopus 로고
    • M2: Multicasting mixes for efficient and anonymous communication
    • G. Perng, M. K. Reiter, and C. Wang. M2: Multicasting mixes for efficient and anonymous communication. In IEEE ICDCS, 2006.
    • (2006) IEEE ICDCS
    • Perng, G.1    Reiter, M.K.2    Wang, C.3
  • 24
    • 0023331864 scopus 로고
    • Networks without user observability
    • A. Pfitzmann and M. Waidner. Networks without user observability. In Computers and Security, 2(6): 158-166, 1987.
    • (1987) Computers and Security , vol.2 , Issue.6 , pp. 158-166
    • Pfitzmann, A.1    Waidner, M.2
  • 26
    • 50249130214 scopus 로고    scopus 로고
    • S. M. Ross. Introduction to probability models. Academic Press ISBN: 0125980558, 2002.
    • S. M. Ross. Introduction to probability models. Academic Press ISBN: 0125980558, 2002.
  • 27
    • 0034447260 scopus 로고    scopus 로고
    • A protocol for anonymous communication over the internet
    • C. Shields and B. N. Levine. A protocol for anonymous communication over the internet. In ACM CCS, 2000.
    • (2000) ACM CCS
    • Shields, C.1    Levine, B.N.2
  • 28
    • 70349301114 scopus 로고    scopus 로고
    • Timing analysis in low latency mix networks: Attacks and defenses
    • V. Shmatikov and M. H. Wang. Timing analysis in low latency mix networks: Attacks and defenses. In 11th ESORICS, 2006.
    • (2006) 11th ESORICS
    • Shmatikov, V.1    Wang, M.H.2
  • 29
    • 50249151390 scopus 로고    scopus 로고
    • G. I. Sound. VoIP: Better than PSTN? http://www.globalipsound.com/demo/ tutorial.php.
    • G. I. Sound. VoIP: Better than PSTN? http://www.globalipsound.com/demo/ tutorial.php.
  • 31
    • 33745773302 scopus 로고    scopus 로고
    • Tracking anonymous peer-to-peer VoIP calls on the internet
    • X. Wang, S. Chen, and S. Jajodia. Tracking anonymous peer-to-peer VoIP calls on the internet. In 12th ACM CCS, 2005.
    • (2005) 12th ACM CCS
    • Wang, X.1    Chen, S.2    Jajodia, S.3
  • 32
    • 2442556704 scopus 로고    scopus 로고
    • Robust correlation of encrypted attack traffic through stepping stones by manipulation of interpacket delays
    • X. Wang and D. Reeves. Robust correlation of encrypted attack traffic through stepping stones by manipulation of interpacket delays. In 10th ACM CCS, 2003.
    • (2003) 10th ACM CCS
    • Wang, X.1    Reeves, D.2
  • 33
    • 2442569400 scopus 로고    scopus 로고
    • Inter-packet delay based correlation for tracing encrypted connections through stepping stones
    • X. Wang, D. Reeves, and S. Wu. Inter-packet delay based correlation for tracing encrypted connections through stepping stones. In 7th ESORICS, 2002.
    • (2002) 7th ESORICS
    • Wang, X.1    Reeves, D.2    Wu, S.3
  • 34
    • 34548362125 scopus 로고    scopus 로고
    • Residual-based measurement of peer and link lifetimes in gnutella networks
    • X. Wang, Z. Yao, and D. Loguinov. Residual-based measurement of peer and link lifetimes in gnutella networks. In IEEE InfoCom, 2007.
    • (2007) IEEE InfoCom
    • Wang, X.1    Yao, Z.2    Loguinov, D.3
  • 35
    • 2442556704 scopus 로고    scopus 로고
    • Robust correlation of encrypted attack traffic through stepping stones by manipulation of interpacket delays
    • X. Y. Wang and D. S. Reeves. Robust correlation of encrypted attack traffic through stepping stones by manipulation of interpacket delays. In ACM CCS, 2003.
    • (2003) ACM CCS
    • Wang, X.Y.1    Reeves, D.S.2
  • 36
    • 2442581931 scopus 로고    scopus 로고
    • Finding a connection chain for tracing intruders
    • K. Yoda and H. Etoh. Finding a connection chain for tracing intruders. In 6th ESORICS, 2000.
    • (2000) 6th ESORICS
    • Yoda, K.1    Etoh, H.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.