Empirical tests of anonymous voice over IP
Tài liệu tham khảo
Barbosa R, Kamienski C, Mariz D, Callado A, Fernandes S, Sadok D. Performance evaluation of P2P VoIP applications. In: Proceedings of the ACM NOSSDAV, 2007.
Berthold O, Federrath H, Köpsell S. Web MIXes: a system for anonymous and unobservable Internet access. In: Proceedings of the privacy enhancing technology, 2000.
Bauer K, McCoy D, Grunwald D, Kohno T, Sicker D. Low-resource routing attacks against Tor. In: ACM WPES, 2007.
Cheng A, Friedman E. Sybilproof reputation mechanisms. In: ACM workshop on the economics of peer-to-peer systems, 2005. p. 128–32.
Cole RG, Rosenbluth JH. Voice over IP performance monitoring. SIGCOMM Computer Communications Review, 2001, 4 (3).
Danezis G. The traffic analysis of continuous-time mixes. In: Proceedings of the privacy enhancing technologies. Lecture notes in computer science, vol. 3424, 2004. p. 35–50.
Douceur J. The Sybil attack. In: Proceedings of the IPTPS, 2002.
Dingledine R, Mathewson N, Syverson P. Tor: the next-generation onion router. In: Proceedings of the USENIX security symposium, 2004.
Feamster N, Dingledine R. Location diversity in anonymity networks. In: Proceedings of the WPES, 2004.
Furuya H, Nomoto S, Yamada H, Fukumoto N, Sugaya F. Experimental investigation of the relationship between IP network performances and speech quality of VoIP. In: Proceedings of the international conference on telecommunications (ICT 2003), 2003.
Goode B. Voice over Internet protocol (VOIP). In: Proceedings of the IEEE, vol. 90, 2002. p. 1495–517.
Hopper N, Vasserman EY, Chan-Tin E. How much anonymity does network latency leak?. In: Proceedings of the ACM CCS, 2007.
Intl. Telecommunication Union, ITU-T G.114, One-way transmission time, May 2003.
Karopoulos, 2010, A framework for identity privacy in SIP, Journal of Network and Computer Applications, 33, 16, 10.1016/j.jnca.2009.07.004
Kesdogan, 2006, Technical challenges of network anonymity, Computer Communications, 29, 306, 10.1016/j.comcom.2004.12.011
Le Maistre R. Skype: revenue doubles, growth slows, light reading 〈http://www.lightreading.com/document.asp?doc_id=122229〉, April 27, 2007.
Levine B, Reiter M, Wang C, Wright M. Timing attacks in low-latency mix systems. In: Proceedings of the financial cryptography, 2004. p. 251—65.
Mehta PC, Udani S. Overview of voice over IP. Technical Report MS-CIS-01-31, University of Pennsylvania, February 2001.
Markopoulou AP, Tobagi FA, Karam MJ. Assessment of VoIP quality over Internet backbones. In: Proceedings of IEEE INFOCOM, 2002.
Murdoch SJ, Danezis G. Low-cost traffic analysis of Tor. In: Proceedings of the IEEE symposium on security and privacy, 2005.
Murdoch, 2007, Sampled traffic analysis by Internet-exchange-level adversaries
Pfitzmann, 1987, Networks without user observability, Computers & Security, 6, 158, 10.1016/0167-4048(87)90087-3
Reardon J, Goldberg I. Improving Tor using a TCP-over-DTLS tunnel. In: Proceedings of the USENIX security symposium, 2009.
Ren, 2010, Survey on anonymous communications in computer networks, Computer Communications, 33, 420, 10.1016/j.comcom.2009.11.009
Rossi, 2009, Understanding Skype signaling, Computer Networks, 53, 130, 10.1016/j.comnet.2008.10.013
Sherr M, Blaze M, Loo BT. Scalable link-based relay selection for anonymous routing. In: 9th privacy enhancing technologies symposium (PETS ’09), 2009.
Skevik, 2009, Evaluation of a comprehensive P2P video-on-demand streaming system, Computer Networks, 53, 434, 10.1016/j.comnet.2008.09.025
Snader R, Borisov N. A tune-up for Tor: improving security and performance in the Tor network. In: Proceedings of the NDSS, 2007.
Suh K, Figueiredo DR, Kurose J, Towsley D. Characterizing and detecting relayed traffic: a case study using Skype. In: Proceedings of IEEE Infocom, 2006.
Tang, 2007, Topology-aware overlay path probing, Computer Communications, 30, 1994, 10.1016/j.comcom.2007.03.004
Tang, 2010, CORS: a cooperative overlay routing service to enhance interactive multimedia communications, Journal of Visual Communication and Image Representation, 21, 107, 10.1016/j.jvcir.2009.06.005
Wang X, Chen S, Jajodia S. Tracking anonymous peer-to-peer VoIP calls on the Internet. In: Proceedings of the ACM CCS, 2005.
Wright, 2004, The predecessor attack: an analysis of a threat to anonymous communications systems, ACM TISSEC, 4, 489, 10.1145/1042031.1042032
