Tracking anonymous peer-to-peer VoIP calls on the internet (English)
- New search for: Wang, Xinyuan
- New search for: Chen, Shiping
- New search for: Jajodia, Sushil
- New search for: Wang, Xinyuan
- New search for: Chen, Shiping
- New search for: Jajodia, Sushil
In:
CCS, ACM Conference on Computer and Communications Security, 12
;
81-91
;
2005
-
ISBN:
- Conference paper / Print
-
Title:Tracking anonymous peer-to-peer VoIP calls on the internet
-
Contributors:
-
Published in:
-
Publisher:
- New search for: ACM - Association for Computing Machinery
-
Place of publication:New York
-
Publication date:2005
-
Size:11 Seiten, 10 Bilder, 35 Quellen
-
ISBN:
-
DOI:
-
Type of media:Conference paper
-
Type of material:Print
-
Language:English
-
Keywords:
-
Source:
Table of contents conference proceedings
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
Homeland Security: Cyber Security R&D InitiativesMaughan, D. / ACM Special Interest Group on Security, Audit & Control et al. | 2005
- 2
-
A Modular Correctness Proof of IEEE 802.11i and TLSHe, C. / Sundararajan, M. / Datta, A. / Derek, A. / Mitchell, J. C. / ACM Special Interest Group on Security, Audit & Control et al. | 2005
- 16
-
Deciding Security of Protocols against Off-line Guessing AttacksBaudet, M. / ACM Special Interest Group on Security, Audit & Control et al. | 2005
- 26
-
Secrecy Types for a Simulatable Cryptographic LibraryLaud, P. / ACM Special Interest Group on Security, Audit & Control et al. | 2005
- 36
-
Preventing Attribute Information Leakage in Automated Trust NegotiationIrwin, K. / Yu, T. / ACM Special Interest Group on Security, Audit & Control et al. | 2005
- 46
-
Automated Trust Negotiation Using Cryptographic CredentialsLi, J. / Li, N. / Winsborough, W. H. / ACM Special Interest Group on Security, Audit & Control et al. | 2005
- 58
-
Secure Collaboration in Mediator-Free EnvironmentsShehab, M. / Bertino, E. / Ghafoor, A. / ACM Special Interest Group on Security, Audit & Control et al. | 2005
- 68
-
Applications of Secure Electronic Voting to Automated Privacy-Preserving TroubleshootingHuang, Q. / Jao, D. / Wang, H. J. / ACM Special Interest Group on Security, Audit & Control et al. | 2005
- 81
-
Tracking Anonymous Peer-to-Peer VoIP Calls on the InternetWang, X. / Chen, S. / Jajodia, S. / ACM Special Interest Group on Security, Audit & Control et al. | 2005
- 92
-
Untraceable RFID Tags via Insubvertible EncryptionAteniese, G. / Camenisch, J. / de Medeiros, B. / ACM Special Interest Group on Security, Audit & Control et al. | 2005
- 102
-
Obfuscated Databases and Group PrivacyNarayanan, A. / Shmatikov, V. / ACM Special Interest Group on Security, Audit & Control et al. | 2005
- 112
-
New Approaches for Deniable AuthenticationDi Raimondo, M. / Gennaro, R. / ACM Special Interest Group on Security, Audit & Control et al. | 2005
- 122
-
On Authenticated Computing and RSA-based AuthenticationSeifert, J.-P. / ACM Special Interest Group on Security, Audit & Control et al. | 2005
- 128
-
Aggregated Path Authentication for Efficient BGP SecurityZhao, M. / Smith, S. W. / Nicol, D. M. / ACM Special Interest Group on Security, Audit & Control et al. | 2005
- 139
-
Improving Brumley and Boneh Timing Attack on Unprotected SSL ImplementationsAciicmez, O. / Schindler, W. / Koc, C. K. / ACM Special Interest Group on Security, Audit & Control et al. | 2005
- 147
-
CPOL: High-Performance Policy EvaluationBorders, K. / Zhao, X. / Prakash, A. / ACM Special Interest Group on Security, Audit & Control et al. | 2005
- 158
-
Understanding and Developing Role-Based Administrative ModelsCrampton, J. / ACM Special Interest Group on Security, Audit & Control et al. | 2005
- 168
-
PeerAccess: A Logic for Distributed AuthorizationWinslett, M. / Zhang, C. C. / Bonatti, P. A. / ACM Special Interest Group on Security, Audit & Control et al. | 2005
- 180
-
Modeling Insider Attacks on Group Key-Exchange ProtocolsKatz, J. / Shin, J. S. / ACM Special Interest Group on Security, Audit & Control et al. | 2005
- 190
-
Dynamic and Efficient Key Management for Access HierarchiesAtallah, M. J. / Frikken, K. B. / Blanton, M. / ACM Special Interest Group on Security, Audit & Control et al. | 2005
- 203
-
A Model and Architecture for Pseudo-Random Generation and Applications to /dev/randomBarak, B. / Halevi, S. / ACM Special Interest Group on Security, Audit & Control et al. | 2005
- 213
-
Fast and Automated Generation of Attack Signatures: A Basis for Building Self-Protecting ServersLiang, Z. / Sekar, R. / ACM Special Interest Group on Security, Audit & Control et al. | 2005
- 223
-
Automatic Diagnosis and Response to Memory Corruption VulnerabilitiesXu, J. / Ning, P. / Kil, C. / Zhai, Y. / Bookholt, C. / ACM Special Interest Group on Security, Audit & Control et al. | 2005
- 235
-
On Deriving Unknown Vulnerabilities from Zero-Day Polymorphic and Metamorphic Worm ExploitsCrandall, J. R. / Su, Z. / Wu, S. F. / Chong, F. T. / ACM Special Interest Group on Security, Audit & Control et al. | 2005
- 249
-
Countering DoS Attacks With Stateless Multipath OverlaysStavrou, A. / Keromytis, A. D. / ACM Special Interest Group on Security, Audit & Control et al. | 2005
- 260
-
A Framework for Concrete Reputation-Systems with Applications to History-Based Access ControlKrukow, K. / Nielsen, M. / Sassone, V. / ACM Special Interest Group on Security, Audit & Control et al. | 2005
- 270
-
An Auctioning Reputation System Based on Anomaly DetectionRubin, S. / Christodorescu, M. / Ganapathy, V. / Giffin, J. T. / Kruger, L. / Wang, H. / ACM Special Interest Group on Security, Audit & Control et al. | 2005
- 280
-
On the Cost-Ineffectiveness of Redundancy in Commercial P2P ComputingYurkewych, M. / Levine, B. N. / Rosenberg, A. L. / ACM Special Interest Group on Security, Audit & Control et al. | 2005
- 289
-
Securing Publish-Subscribe Overlay Services with EventGuardSrivatsa, M. / Liu, L. / ACM Special Interest Group on Security, Audit & Control et al. | 2005
- 299
-
Password Authenticated Key Exchange Using Hidden Smooth SubgroupsGentry, C. / Mackenzie, P. / Ramzan, Z. / ACM Special Interest Group on Security, Audit & Control et al. | 2005
- 310
-
Proxy Re-Signatures: New Definitions, Algorithms, and ApplicationsAteniese, G. / Hohenberger, S. / ACM Special Interest Group on Security, Audit & Control et al. | 2005
- 320
-
Direct Chosen Ciphertext Security from Identity-Based TechniquesBoyen, X. / Mei, Q. / Waters, B. / ACM Special Interest Group on Security, Audit & Control et al. | 2005
- 330
-
Automatic Placement of Authorization Hooks in the Linux Security Modules FrameworkGanapathy, V. / Jaeger, T. / Jha, S. / ACM Special Interest Group on Security, Audit & Control et al. | 2005
- 340
-
Control-Flow Integrity: Principles, Implementations, and ApplicationsAbadi, M. / Budiu, M. / Erlingsson, U. / Ligatti, J. / ACM Special Interest Group on Security, Audit & Control et al. | 2005
- 354
-
Preventing Format-String Attacks via Automatic and Efficient Dynamic CheckingRingenburg, M. F. / Grossman, D. / ACM Special Interest Group on Security, Audit & Control et al. | 2005
- 364
-
Fast Dictionary Attacks on Passwords Using Time-Space TradeoffNarayanan, A. / Shmatikov, V. / ACM Special Interest Group on Security, Audit & Control et al. | 2005
- 373
-
Keyboard Acoustic Emanations RevisitedZhuang, L. / Zhou, F. / Tygar, J. D. / ACM Special Interest Group on Security, Audit & Control et al. | 2005
- 383
-
Misbehaving TCP Receivers Can Cause Internet-Wide Congestion CollapseSherwood, R. / Bhattacharjee, B. / Braud, R. / ACM Special Interest Group on Security, Audit & Control et al. | 2005
- 393
-
Exploiting Open Functionality in SMS-Capable Cellular NetworksEnck, W. / Traynor, P. / McDaniel, P. / La Porta, T. / ACM Special Interest Group on Security, Audit & Control et al. | 2005
- 405
-
Security Market: Incentives for Disclosure of VulnerabilitiesSwire, P. P. / ACM Special Interest Group on Security, Audit & Control et al. | 2005
- 406
-
Identity-Based Encryption From Algorithm to Enterprise DeploymentAppenzeller, G. / ACM Special Interest Group on Security, Audit & Control et al. | 2005
- 407
-
Biometrics Hit the Mainstream: An Analysis of Security and Privacy ImplicationsBjorn, V. / ACM Special Interest Group on Security, Audit & Control et al. | 2005