-
1
-
-
84958083286
-
-
Viber communication security, Unscramble the scrambled
-
Appelman, M., Bosma, J., & Veerman, G. (2011). Viber communication security: Unscramble the scrambled.
-
(2011)
& Veerman, G
-
-
Appelman, M.1
Bosma, J.2
-
2
-
-
84958083287
-
-
Australian Government Department of Broadband Communications and Digital Economy. (2013). Statistical Snapshot
-
Australian Government Department of Broadband Communications and Digital Economy. (2013). Statistical Snapshot.
-
-
-
-
3
-
-
84877261395
-
-
Azab, A., Watters, P., & Layton, R. (2012). Characterising network traffic for skype forensics. In Proceedings of the Third Cybercrime and Trustworthy Computing Workshop (CTC), Australia, 29–30 October 2012 (pp. 19–27)
-
Azab, A., Watters, P., & Layton, R. (2012). Characterising network traffic for skype forensics. In Proceedings of theThird Cybercrime and Trustworthy Computing Workshop (CTC), Australia, 29–30 October 2012 (pp. 19–27).
-
-
-
-
4
-
-
84902262572
-
A study of ten popular android mobile voip applications: Are the communications encrypted? In Proceedings of the 47th Anual Hawaii International Conference on System Sciences (HICSS)
-
Azfar, A., Choo, K.-K. R., & Liu, L. (2014). A study of ten popular android mobile voip applications: Are the communications encrypted? In Proceedings of the 47th Anual Hawaii International Conference on System Sciences (HICSS), Hawaii, 6–9 January 2014 (pp. 4858–4867).
-
(2014)
Hawaii, 6–9 January
, vol.2014
, pp. 4858-4867
-
-
Azfar, A.1
Choo, K.-K.R.2
Liu, L.3
-
5
-
-
84958083289
-
Critical flaw in Viber allows full access to Android Smartphones, bypassing lock screen. Accessed April 30, 2013
-
BKAV Internet Security Corporation (2013). Critical flaw in Viber allows full access to Android Smartphones, bypassing lock screen. Accessed April 30, 2013, from http://www.bkav.com/top-news/-/view_content/content/46264/critical-flaw-in-viber-allows-full-access-to-android-smartphones-bypassing-lock-screen.
-
(2013)
from
-
-
Internet Security Corporation, B.K.A.V.1
-
6
-
-
83055174716
-
-
Blond, S. L., Zhang, C., Legout, A., Ross, K., & Dabbous, W. (2011). I know where you are and what you are sharing: exploiting P2P communications to invade users’ privacy. In Proceedings of the ACM Internet Measurement Conference (SIGCOMM 2011), Germany, 2–4 November 2011 (pp. 45–60)
-
Blond, S. L., Zhang, C., Legout, A., Ross, K., & Dabbous, W. (2011). I know where you are and what you are sharing: exploiting P2P communications to invade users’ privacy. In Proceedings of theACM Internet Measurement Conference (SIGCOMM 2011), Germany, 2–4 November 2011 (pp. 45–60).
-
-
-
-
7
-
-
65049084187
-
Beyond e-business models: The road to virtual worlds
-
Cagnina, M., & Poian, M. (2009). Beyond e-business models: The road to virtual worlds. Electronic Commerce Research,9(1–2), 49–75.
-
(2009)
Electronic Commerce Research
, vol.9
, Issue.1-2
, pp. 49-75
-
-
Cagnina, M.1
Poian, M.2
-
8
-
-
84958083291
-
-
Wright, J: Advanced metering infrastructure attack methodology
-
Carpenter, M., & Wright, J. (2009). Advanced metering infrastructure attack methodology. http://inguardians.com/pubs/AMI_Attack_Methodology.pdf.
-
(2009)
-
-
Carpenter, M.1
-
9
-
-
84886298305
-
The security service rating design for IT convergence services
-
Chang, H. (2013). The security service rating design for IT convergence services. Electronic Commerce Research,13(3), 317–328.
-
(2013)
Electronic Commerce Research
, vol.13
, Issue.3
, pp. 317-328
-
-
Chang, H.1
-
10
-
-
64249090328
-
Smart phone for mobile commerce
-
Chang, Y. F., Chen, C. S., & Zhou, H. (2009). Smart phone for mobile commerce. Computer Standards & Interfaces,31(4), 740–747.
-
(2009)
Computer Standards & Interfaces
, vol.31
, Issue.4
, pp. 740-747
-
-
Chang, Y.F.1
Chen, C.S.2
Zhou, H.3
-
11
-
-
36248972280
-
Investigating antecedents of technology acceptance of initial eCRM users beyond generation X and the role of self-construal
-
Chen, Q., Chen, H.-M., & Kazman, R. (2007). Investigating antecedents of technology acceptance of initial eCRM users beyond generation X and the role of self-construal. Electronic Commerce Research,7(3–4), 315–339.
-
(2007)
Electronic Commerce Research
, vol.7
, Issue.3-4
, pp. 315-339
-
-
Chen, Q.1
Chen, H.-M.2
Kazman, R.3
-
13
-
-
84923218053
-
Mobile cloud storage users
-
Choo, K.-K. R. (2014). Mobile cloud storage users. IEEE Cloud Computing,1(3), 20–23.
-
(2014)
IEEE Cloud Computing
, vol.1
, Issue.3
, pp. 20-23
-
-
Choo, K.-K.R.1
-
15
-
-
84958083292
-
-
Does Skype use encryption? Retrieved January 30, 2014, from
-
Does Skype use encryption? Retrieved January 30, 2014, from https://support.skype.com/en/faq/FA31/does-skype-use-encryption.
-
-
-
-
16
-
-
79955088769
-
Entropy estimation for real-time encrypted traffic identification (Short Paper)
-
Lecture Notes in Computer Science, Springer Berl
-
Dorfinger, P., Panholzer, G., & John, W. (2011). Entropy estimation for real-time encrypted traffic identification (Short Paper). In J. Domingo-Pascual, Y. Shavitt, & S. Uhlig (Eds.), Traffic monitoring and analysis (Vol. 6613, pp. 164–171, Lecture Notes in Computer Science): Springer Berlin Heidelberg.
-
(2011)
Traffic monitoring and analysis (Vol. 6613
, pp. 164-171
-
-
Dorfinger, P.1
Panholzer, G.2
John, W.3
Domingo-Pascual, J.4
Shavitt, Y.5
Uhlig, S.6
-
17
-
-
84958083293
-
-
Fring. Retrieved January 27, 2014, from
-
Fring. Retrieved January 27, 2014, from http://www.fring.com/.
-
-
-
-
18
-
-
85143575517
-
-
Ghaemmaghami, H., Dean, D., Sridharan, S., & McCowan, I. (2010). Noise robust voice activity detection using normal probability testing and time-domain histogram analysis. In Proceedings of the IEEE International Conference on Acoustics Speech and Signal Processing (ICASSP), USA, 14–19 March 2010 (pp. 4470–4473)
-
Ghaemmaghami, H., Dean, D., Sridharan, S., & McCowan, I. (2010). Noise robust voice activity detection using normal probability testing and time-domain histogram analysis. In Proceedings of theIEEE International Conference on Acoustics Speech and Signal Processing (ICASSP), USA, 14–19 March 2010 (pp. 4470–4473).
-
-
-
-
20
-
-
84883352782
-
Identification of peer-to-peer VoIP sessions using entropy and codec properties
-
Gomes, J., Inacio, P., Pereira, M., Freire, M., & Monteiro, P. (2013). Identification of peer-to-peer VoIP sessions using entropy and codec properties. IEEE Transactions on Parallel and Distributed Systems,24(10), 2004–2014.
-
(2013)
IEEE Transactions on Parallel and Distributed Systems
, vol.24
, Issue.10
, pp. 2004-2014
-
-
Gomes, J.1
Inacio, P.2
Pereira, M.3
Freire, M.4
Monteiro, P.5
-
21
-
-
84958083295
-
-
Google How Hangouts encrypts information. Retrieved April 3, 2015, from
-
Google How Hangouts encrypts information. Retrieved April 3, 2015, from https://support.google.com/hangouts/answer/6046115?hl=en#.
-
-
-
-
22
-
-
0036697706
-
New voice over Internet protocol technique with hierarchical data security protection
-
Guo, J.-I., Yen, J.-C., & Pai, H.-F. (2002). New voice over Internet protocol technique with hierarchical data security protection. IEE Proceedings: Vision, Image and Signal Processing,149(4), 237–243.
-
(2002)
IEE Proceedings: Vision, Image and Signal Processing
, vol.149
, Issue.4
, pp. 237-243
-
-
Guo, J.-I.1
Yen, J.-C.2
Pai, H.-F.3
-
23
-
-
84958083296
-
Big Blue Ball.com: Instant messaging & social networking. Accessed January 25, 2014
-
Hester, J. (2009). Big Blue Ball.com: Instant messaging & social networking. Accessed January 25, 2014, from http://www.bigblueball.com/im/googletalk/.
-
(2009)
from
-
-
Hester, J.1
-
24
-
-
84958083297
-
ICQ Privacy Policy. Accessed April 3, 2015
-
ICQ. (2011). ICQ Privacy Policy. Accessed April 3, 2015, from http://www.icq.com/legal/privacypolicy/en.
-
(2011)
from
-
-
-
25
-
-
84958083298
-
Accessed January 15, 2014
-
Infonetics Research raises VoLTE forecast; Over-the-top mobile VoIP subscribers nearing 1 billion mark (2013). Accessed January 15, 2014, from http://www.infonetics.com/pr/2013/Mobile-VoIP-Services-and-Subscribers-Market-Highlights.asp.
-
(2013)
from
-
-
forecast, I.R.V.L.T.E.1
-
26
-
-
80054854394
-
Security measures for VoIP application: A state of the art review
-
Jahanirad, M., AL-Nabhani, Y., & Noor, R. M. (2011). Security measures for VoIP application: A state of the art review. Scientific Research and Essays,6(23), 4950–4959.
-
(2011)
Scientific Research and Essays
, vol.6
, Issue.23
, pp. 4950-4959
-
-
Jahanirad, M.1
AL-Nabhani, Y.2
Noor, R.M.3
-
27
-
-
4744354027
-
On compressing encrypted data
-
Johnson, M., Ishwar, P., Prabhakaran, V., Schonberg, D., & Ramchandran, K. (2004). On compressing encrypted data. IEEE Transactions on Signal Processing,52(10), 2992–3006.
-
(2004)
IEEE Transactions on Signal Processing
, vol.52
, Issue.10
, pp. 2992-3006
-
-
Johnson, M.1
Ishwar, P.2
Prabhakaran, V.3
Schonberg, D.4
Ramchandran, K.5
-
28
-
-
79959557404
-
-
King, A., & Lyons, K. (2011). Automatic status updates in distributed software development. In Proceedings of the 2nd International Workshop on Web 2.0 for Software Engineering, USA, 21–28 May 2011 (pp. 19–24)
-
King, A., & Lyons, K. (2011). Automatic status updates in distributed software development. In Proceedings of the2nd International Workshop on Web 2.0 for Software Engineering, USA, 21–28 May 2011 (pp. 19–24).
-
-
-
-
29
-
-
84881647698
-
J., Ko, H.-S., Park, S., Seo, M., & Kim, I. (2011).Study on secure mobile communication based on the hardware security module. In Fifth International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies (UBICOMM 2011)
-
Lee, J., Ko, H.-S., Park, S., Seo, M., & Kim, I. (2011).Study on secure mobile communication based on the hardware security module. In Fifth International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies (UBICOMM 2011), Portugal, 20–25 November 2011 (pp. 23–26)
-
(2011)
Portugal
, vol.20-25
, pp. 23-26
-
-
-
30
-
-
84958083300
-
XEP-0166: Jingle. Accessed January 30, 2014
-
Ludwig, S., Beda, J., Saint-Andre, P., McQueen, R., Egan, S., & Hildebrand, J. (2009). XEP-0166: Jingle. Accessed January 30, 2014, from http://xmpp.org/extensions/xep-0166.html.
-
(2009)
from
-
-
Ludwig, S.1
Beda, J.2
Saint-Andre, P.3
McQueen, R.4
Egan, S.5
Hildebrand, J.6
-
31
-
-
78249266016
-
Implementation and performance for lawful intercept of VoIP calls based on SIP session border controller. In Proceedings of the IEEE 10th International Conference on Computer and Information Technology (CIT)
-
Menghui, Y., Hua, L., & Tonghong, L. (2010). Implementation and performance for lawful intercept of VoIP calls based on SIP session border controller. In Proceedings of the IEEE 10th International Conference on Computer and Information Technology (CIT), United Kingdom, 29 June-1 July 2010 (pp. 2635–2642).
-
(2010)
United Kingdom, 29 June-1 July
, vol.2010
, pp. 2635-2642
-
-
Menghui, Y.1
Hua, L.2
Tonghong, L.3
-
32
-
-
33646491223
-
Security of a mobile transaction: A trust model
-
Misra, S. K., & Wickamasinghe, N. (2004). Security of a mobile transaction: A trust model. Electronic Commerce Research,4(4), 359–372.
-
(2004)
Electronic Commerce Research
, vol.4
, Issue.4
, pp. 359-372
-
-
Misra, S.K.1
Wickamasinghe, N.2
-
33
-
-
84958083301
-
-
Nimbuzz. Accessed January 30, 2014, from
-
Nimbuzz. Accessed January 30, 2014, from http://www.nimbuzz.com/en/support.
-
-
-
-
34
-
-
84958083302
-
-
NSA slides explain the PRISM data-collection program. (2013). The Washington Post
-
NSA slides explain the PRISM data-collection program. (2013). The Washington Post.
-
-
-
-
35
-
-
84958083303
-
-
PcapHistogram. Retrieved January 30, 2014, from
-
PcapHistogram. Retrieved January 30, 2014, from http://www.willhackforsushi.com/code/pcaphistogram.pl.
-
-
-
-
36
-
-
84958083304
-
Google defends its use of proprietary tech in Hangouts
-
(May 25)
-
Perez, J. C. (2013, May 25). Google defends its use of proprietary tech in Hangouts. PC World
-
(2013)
PC World
-
-
Perez, J.C.1
-
37
-
-
84958083305
-
-
pyNetEntropy. Accessed January 30, 2014, from
-
pyNetEntropy. Accessed January 30, 2014, from https://github.com/batidiane/pyNetEntropy.
-
-
-
-
38
-
-
84958083306
-
-
Sarkar, A. (2012). Yahoo! Voice Compromised, 450 K Login Credentials Stolen & Posted In Plain Text. Accessed January 30, 2014, from
-
Sarkar, A. (2012). Yahoo! Voice Compromised, 450 K Login Credentials Stolen & Posted In Plain Text. Accessed January 30, 2014, from http://www.voiceofgreyhat.com/2012/07/yahoo-voice-compromised-450k-login.html.
-
-
-
-
39
-
-
84944486544
-
Prediction and entropy of printed English
-
Shannon, C. E. (1951). Prediction and entropy of printed English. Bell Systems Technical Journal,30(1), 50–64.
-
(1951)
Bell Systems Technical Journal
, vol.30
, Issue.1
, pp. 50-64
-
-
Shannon, C.E.1
-
40
-
-
84958083307
-
-
Shepard, B. (2013). 10 Cool Ways Companies Use Skype. Accessed January 30, 2014, from
-
Shepard, B. (2013). 10 Cool Ways Companies Use Skype. Accessed January 30, 2014, from http://blogs.skype.com/2013/08/28/happy-10th-ten-cool-ways-companies-use-skype/.
-
-
-
-
41
-
-
84857378001
-
A formally verified mechanism for countering SPIT
-
Lecture Notes in Computer Science, Springer Berl
-
Soupionis, Y., Basagiannis, S., Katsaros, P., & Gritzalis, D. (2011). A formally verified mechanism for countering SPIT. In C. Xenakis, & S. Wolthusen (Eds.), Critical Information Infrastructures Security (Vol. 6712, pp. 128–139, Lecture Notes in Computer Science): Springer Berlin Heidelberg.
-
(2011)
Critical Information Infrastructures Security (Vol. 6712
, pp. 128-139
-
-
Soupionis, Y.1
Basagiannis, S.2
Katsaros, P.3
Gritzalis, D.4
Xenakis, C.5
Wolthusen, S.6
-
42
-
-
84958083308
-
-
Tango. Accessed January 27, 2014, from
-
Tango. Accessed January 27, 2014, from http://www.tango.me/.
-
-
-
-
43
-
-
84958083309
-
-
Viber are my messages secure? Accessed April 3, 2015, from
-
Viber are my messages secure? Accessed April 3, 2015, from https://support.viber.com/customer/portal/articles/1600146-are-my-messages-secure-#.VR321vmUeSo.
-
-
-
-
44
-
-
84958083310
-
-
Viber Connect Freely. Accessed January 15, 2015, from
-
Viber Connect Freely. Accessed January 15, 2015, from http://www.viber.com/.
-
-
-
-
45
-
-
84958083311
-
-
VoIP Users Conference. Accessed January 27, 2014, from
-
VoIP Users Conference. Accessed January 27, 2014, from http://www.voipusersconference.org/2011/jabber-jitsi-nimbuzz/.
-
-
-
-
46
-
-
84958083312
-
-
Vonage Mobile. Accessed January 30, 2014, from
-
Vonage Mobile. Accessed January 30, 2014, from http://www.vonagemobile.com/.
-
-
-
-
47
-
-
84877626643
-
An intrusion detection and prevention system for IMs and VoIP services
-
Vrakas, N., & Lambrinoudakis, C. (2013). An intrusion detection and prevention system for IMs and VoIP services. International Journal of Information Security,2(3), 201–217.
-
(2013)
International Journal of Information Security
, vol.2
, Issue.3
, pp. 201-217
-
-
Vrakas, N.1
Lambrinoudakis, C.2
-
48
-
-
79960900018
-
A dependable privacy protection for end-to-end VoIP via Elliptic-Curve Diffie-Hellman and dynamic key changes
-
Wang, C.-H., & Liu, Y.-S. (2011). A dependable privacy protection for end-to-end VoIP via Elliptic-Curve Diffie-Hellman and dynamic key changes. Journal of Network and Computer Applications,34(5), 1545–1556.
-
(2011)
Journal of Network and Computer Applications
, vol.34
, Issue.5
, pp. 1545-1556
-
-
Wang, C.-H.1
Liu, Y.-S.2
-
49
-
-
84958083313
-
-
WeChat The New Way to Connect. Accessed January 15, 2015, from
-
WeChat The New Way to Connect. Accessed January 15, 2015, from http://www.wechat.com/en/.
-
-
-
-
50
-
-
50249161557
-
Language identification of encrypted VoIP traffic: Alejandra y Roberto or Alice and Bob?
-
Wright, C. V., Ballard, L., Monrose, F., & Masson, G. M. (2007). Language identification of encrypted VoIP traffic: Alejandra y Roberto or Alice and Bob? In USENIX Security, 2007 (Vol. 3, pp. 43–54, Vol. 3.6)
-
(2007)
In USENIX Security
, vol.2007
, Issue.Vol. 3, pp. 43–54, Vol. 3.6
-
-
Wright, C.V.1
Ballard, L.2
Monrose, F.3
Masson, G.M.4
-
51
-
-
84958083315
-
-
Yahoo! 7 Messenger. Accessed January 30, 2014, from
-
Yahoo! 7 Messenger. Accessed January 30, 2014, from http://au.messenger.yahoo.com/features/.
-
-
-
|