-
Chapter and Conference Paper
An Analysis for Anonymity and Unlinkability for a VoIP Conversation
With the growth of its popularity, VoIP is increasingly popular nowadays. Similarly to other Internet applications, VoIP users may desire to be unlinkable with their participated VoIP session records for priva...
-
Chapter and Conference Paper
Analyzing Key-Click Patterns of PIN Input for Recognizing VoIP Users
Malicious intermediaries are able to detect the availability of VoIP conversation flows in a network and observe the IP addresses used by the conversation partners. However, it is insufficient to infer the cal...
-
Chapter and Conference Paper
Timing Attacks on PIN Input in VoIP Networks (Short Paper)
To access automated voice services, Voice over IP (VoIP) users sometimes are required to provide their Personal Identification Numbers (PIN) for authentication. Therefore when they enter PINs, their user-agent...
-
Chapter and Conference Paper
TEEM: A User-Oriented Trusted Mobile Device for Multi-platform Security Applications
Trusted Computing (TC) can improve the security of various computing platforms. However, as new computing devices emerge and application scenarios increase, current trusted computing technology cannot satisfy ...
-
Chapter and Conference Paper
Game Theoretic Approach for Cost-Benefit Analysis of Malware Proliferation Prevention
Many existing research efforts in the field of malware proliferation aim at modelling and analysing its spread dynamics. Many malware dissemination models are based on the characteristics of biological disease...