Skip to main content

and
  1. Chapter and Conference Paper

    Analyzing Key-Click Patterns of PIN Input for Recognizing VoIP Users

    Malicious intermediaries are able to detect the availability of VoIP conversation flows in a network and observe the IP addresses used by the conversation partners. However, it is insufficient to infer the cal...

    Ge Zhang in Future Challenges in Security and Privacy for Academia and Industry (2011)

  2. No Access

    Chapter and Conference Paper

    Timing Attacks on PIN Input in VoIP Networks (Short Paper)

    To access automated voice services, Voice over IP (VoIP) users sometimes are required to provide their Personal Identification Numbers (PIN) for authentication. Therefore when they enter PINs, their user-agent...

    Ge Zhang, Simone Fischer-Hübner in Detection of Intrusions and Malware, and V… (2011)

  3. No Access

    Chapter and Conference Paper

    Detecting Near-Duplicate SPITs in Voice Mailboxes Using Hashes

    Spam over Internet Telephony (SPIT) is a threat to the use of Voice of IP (VoIP) systems. One kind of SPIT can make unsolicited bulk calls to victims’ voice mailboxes and then send them a prepared audio messag...

    Ge Zhang, Simone Fischer-Hübner in Information Security (2011)

  4. No Access

    Chapter and Conference Paper

    TEEM: A User-Oriented Trusted Mobile Device for Multi-platform Security Applications

    Trusted Computing (TC) can improve the security of various computing platforms. However, as new computing devices emerge and application scenarios increase, current trusted computing technology cannot satisfy ...

    Wei Feng, Dengguo Feng, Ge Wei, Yu Qin, Qianying Zhang in Trust and Trustworthy Computing (2013)

  5. Chapter and Conference Paper

    Game Theoretic Approach for Cost-Benefit Analysis of Malware Proliferation Prevention

    Many existing research efforts in the field of malware proliferation aim at modelling and analysing its spread dynamics. Many malware dissemination models are based on the characteristics of biological disease...

    Theodoros Spyridopoulos, George Oikonomou in Security and Privacy Protection in Informa… (2013)