Using Secure Real-time Padding Protocol to Secure Voice-over-IP from Traffic Analysis Attacks

[1]  Charles V. Wright,et al.  Spot Me if You Can: Uncovering Spoken Phrases in Encrypted VoIP Conversations , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).

[2]  Wei Wang,et al.  Dependent link padding algorithms for low latency anonymity systems , 2008, CCS.

[3]  David Chaum,et al.  Untraceable electronic mail, return addresses, and digital pseudonyms , 1981, CACM.

[4]  Riccardo Bettati,et al.  Privacy of encrypted voice-over-IP , 2007, 2007 IEEE International Conference on Systems, Man and Cybernetics.