{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T22:27:22Z","timestamp":1725575242615},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642181771"},{"type":"electronic","value":"9783642181788"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-18178-8_24","type":"book-chapter","created":{"date-parts":[[2011,1,15]],"date-time":"2011-01-15T16:09:47Z","timestamp":1295107787000},"page":"276-282","source":"Crossref","is-referenced-by-count":1,"title":["On Privacy Leakage through Silence Suppression"],"prefix":"10.1007","author":[{"given":"Ye","family":"Zhu","sequence":"first","affiliation":[]}],"member":"297","reference":[{"unstructured":"Zimmermann, P., Johnston, A., Callas, J.: Zrtp: Media path key agreement for secure rtp draft-zimmermann-avt-zrtp-11, RFC, United States (2008)","key":"24_CR1"},{"doi-asserted-by":"crossref","unstructured":"Baugher, M., McGrew, D., Naslund, M., Carrara, E., Norrman, K.: The secure real-time transport protocol, srtp (2004)","key":"24_CR2","DOI":"10.17487\/rfc3711"},{"doi-asserted-by":"crossref","unstructured":"Dingledine, R., Mathewson, N., Syverson, P.: Tor: The second-generation onion router. In: Proc. of the 13th USENIX Security Symposium, San Diego, CA, pp. 303\u2013320 (August 2004)","key":"24_CR3","DOI":"10.21236\/ADA465464"},{"unstructured":"cnn.com: Police reveal the identity of shooting suspect, http:\/\/www.cnn.com\/2006\/US\/09\/29\/school.shooting\/index.html","key":"24_CR4"},{"unstructured":"xten.com: X-Lite 3.0 free softphone, http:\/\/www.xten.com\/index.php?menu=Products&smenu=xlite","key":"24_CR5"},{"unstructured":"Lu, Y.: On traffic analysis attacks to encrypted voip calls. Master\u2019s thesis, Cleveland State University, Cleveland, OH 44115 (December 2009)","key":"24_CR6"},{"unstructured":"FindnotProxyList, http:\/\/www.findnot.com\/servers.html","key":"24_CR7"},{"unstructured":"ResearchChannels, http:\/\/www.researchchannel.org","key":"24_CR8"},{"key":"24_CR9","first-page":"25","volume-title":"Proceedings of the 10th Conference on USENIX Security Symposium, SSYM 2001","author":"D.X. Song","year":"2001","unstructured":"Song, D.X., Wagner, D., Tian, X.: Timing analysis of keystrokes and timing attacks on ssh. In: Proceedings of the 10th Conference on USENIX Security Symposium, SSYM 2001, p. 25. USENIX Association, Berkeley (2001)"},{"key":"24_CR10","first-page":"19","volume-title":"Proceedings of the 2002 IEEE Symposium on Security and Privacy, SP 2002","author":"Q. Sun","year":"2002","unstructured":"Sun, Q., Simon, D.R., Wang, Y.M., Russell, W., Padmanabhan, V.N., Qiu, L.: Statistical identification of encrypted web browsing traffic. In: Proceedings of the 2002 IEEE Symposium on Security and Privacy, SP 2002, Washington, DC, USA, p. 19. IEEE Computer Society, Los Alamitos (2002)"},{"key":"24_CR11","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1145\/1655008.1655013","volume-title":"Proceedings of the 2009 ACM Workshop on Cloud Computing Security (CCSW 2009)","author":"D. Herrmann","year":"2009","unstructured":"Herrmann, D., Wendolsky, R., Federrath, H.: Website fingerprinting: attacking popular privacy enhancing technologies with the multinomial na\u00efve-bayes classifier. In: Proceedings of the 2009 ACM Workshop on Cloud Computing Security (CCSW 2009), pp. 31\u201342. ACM, New York (2009)"},{"key":"24_CR12","first-page":"35","volume-title":"Proceedings of the 2008 IEEE Symposium on Security and Privacy, SP 2008","author":"C.V. Wright","year":"2008","unstructured":"Wright, C.V., Ballard, L., Coull, S.E., Monrose, F., Masson, G.M.: Spot me if you can: Uncovering spoken phrases in encrypted voip conversations. In: Proceedings of the 2008 IEEE Symposium on Security and Privacy, SP 2008, Washington, DC, USA, pp. 35\u201349. IEEE Computer Society, Los Alamitos (2008)"},{"unstructured":"Doychev, G.: Speaker recognition in encrypted voice streams, Bachelor\u2019s thesis, Department of Computer Science, Saarland University, Saarbr\u00fccken, Germany (December 2009)","key":"24_CR13"},{"key":"24_CR14","first-page":"5735","volume-title":"Proceedings of the 28th IEEE Conference on Global Telecommunications, GLOBECOM 2009","author":"Y. Zhu","year":"2009","unstructured":"Zhu, Y., Lu, Y., Vikram, A., Fu, H.: On privacy of skype voip calls. In: Proceedings of the 28th IEEE Conference on Global Telecommunications, GLOBECOM 2009, Piscataway, NJ, USA, pp. 5735\u20135740. IEEE Press, New York (2009)"}],"container-title":["Lecture Notes in Computer Science","Information Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-18178-8_24","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,7]],"date-time":"2019-06-07T22:11:18Z","timestamp":1559945478000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-18178-8_24"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642181771","9783642181788"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-18178-8_24","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}