Using Secure Real-time Padding Protocol to Secure Voice-over-IP from Traffic Analysis Attacks
暂无分享,去创建一个
[1] Charles V. Wright,et al. Spot Me if You Can: Uncovering Spoken Phrases in Encrypted VoIP Conversations , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).
[2] Wei Wang,et al. Dependent link padding algorithms for low latency anonymity systems , 2008, CCS.
[3] David Chaum,et al. Untraceable electronic mail, return addresses, and digital pseudonyms , 1981, CACM.
[4] Riccardo Bettati,et al. Privacy of encrypted voice-over-IP , 2007, 2007 IEEE International Conference on Systems, Man and Cybernetics.