메뉴 건너뛰기




Volumn 1, Issue , 2009, Pages 35-40

A security model for VoIP steganography

Author keywords

Security model; Steganography; VoIP

Indexed keywords

BUSINESS OWNERS; COMMUNICATION CHANNEL; INDUSTRY GROUPS; NETWORK THREATS; SECURITY GAP; SECURITY MODEL; SECURITY RISKS; THREAT SCENARIOS; VOIP SERVICE;

EID: 77749304227     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/MINES.2009.227     Document Type: Conference Paper
Times cited : (6)

References (9)
  • 1
    • 77749260054 scopus 로고    scopus 로고
    • Threat Taxonomy Working Group of VOIPSA, VoIP security and privacy threat taxonomy, Public Release 1.0, 24 October 2005
    • Threat Taxonomy Working Group of VOIPSA, "VoIP security and privacy threat taxonomy," Public Release 1.0, 24 October 2005.
  • 4
    • 77749260058 scopus 로고    scopus 로고
    • L. Lessig, Code version 2.0. Basic Books, 2006
    • L. Lessig, Code version 2.0. Basic Books, 2006.
  • 7
    • 33749997850 scopus 로고    scopus 로고
    • On the anonymity and traceability of peer-to-peer voip calls
    • September/October
    • S. Chen, X. Wang, and S. Jajodia, "On the anonymity and traceability of peer-to-peer voip calls," IEEE Network, September/October 2006.
    • (2006) IEEE Network
    • Chen, S.1    Wang, X.2    Jajodia, S.3
  • 8
    • 33746066591 scopus 로고    scopus 로고
    • Syntax and semantics-preserving application-layer protocol steganography
    • Information Hiding J. J. Fridrich, ed, of, Springer
    • N. B. Lucena, J. Pease, P. Yadollahpour, and S. J. Chapin, "Syntax and semantics-preserving application-layer protocol steganography," in Information Hiding (J. J. Fridrich, ed.), vol. 3200 of Lecture Notes in Computer Science, pp. 164-179, Springer, 2004.
    • (2004) Lecture Notes in Computer Science , vol.3200 , pp. 164-179
    • Lucena, N.B.1    Pease, J.2    Yadollahpour, P.3    Chapin, S.J.4
  • 9
    • 85099426088 scopus 로고    scopus 로고
    • Steganography of voip streams
    • OTM Conferences 2, R. Meersman and Z. Tari, eds, of, Springer
    • W. Mazurczyk and K. Szczypiorski, "Steganography of voip streams," in OTM Conferences (2) (R. Meersman and Z. Tari, eds.), vol. 5332 of Lecture Notes in Computer Science, pp. 1001-1018, Springer, 2008.
    • (2008) Lecture Notes in Computer Science , vol.5332 , pp. 1001-1018
    • Mazurczyk, W.1    Szczypiorski, K.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.