You are here

Bibliography

Export 3 results:
Author Title Type [ Year(Asc)]
Filters: Keyword is VoIP  [Clear All Filters]
2009
Wright C, Coull SE, Monrose F. Traffic Morphing: An efficient defense against statistical traffic analysis. In: Proceedings of the Network and Distributed Security Symposium - {NDSS} '09. Proceedings of the Network and Distributed Security Symposium - {NDSS} '09. IEEE; 2009.
2007
Aguilar Melchor C, Deswarte Y, Iguchi-Cartigny J. Closed-Circuit Unobservable Voice Over IP. In: Proceedings of 23rd Annual Computer Security Applications Conference (ACSAC'07), Miami, FL, USA. Proceedings of 23rd Annual Computer Security Applications Conference (ACSAC'07), Miami, FL, USA. IEEE Computer Society Press; 2007. Available from: http://www.computer.org/portal/web/csdl/doi/10.1109/ACSAC.2007.34
2004
Baset SA, Schulzrinne HG. An Analysis of the Skype Peer-to-Peer Internet Telephony Protocol. In: INFOCOM 2006. Proceedings of the 25th Annual Joint Conference of the IEEE Computer and Communications Societies. INFOCOM 2006. Proceedings of the 25th Annual Joint Conference of the IEEE Computer and Communications Societies. Barcelona, Catalunya, Spain; 2004. Available from: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.84.2433