{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,31]],"date-time":"2025-12-31T00:31:58Z","timestamp":1767141118327,"version":"build-2238731810"},"reference-count":63,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2019,8,12]],"date-time":"2019-08-12T00:00:00Z","timestamp":1565568000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2019,8,12]],"date-time":"2019-08-12T00:00:00Z","timestamp":1565568000000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Electron Commer Res"],"published-print":{"date-parts":[[2019,9,15]]},"DOI":"10.1007\/s10660-019-09369-0","type":"journal-article","created":{"date-parts":[[2019,8,12]],"date-time":"2019-08-12T08:03:41Z","timestamp":1565597021000},"page":"655-687","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["A survey on anonymous voice over IP communication: attacks and defenses"],"prefix":"10.1007","volume":"19","author":[{"given":"Ge","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Simone","family":"Fischer-H\u00fcbner","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,8,12]]},"reference":[{"key":"9369_CR1","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1109\/MSECP.2003.1253565","volume":"1","author":"D Agrawal","year":"2003","unstructured":"Agrawal, D., Kesdogan, D.: Measuring anonymity: The disclosure attack. IEEE Security and Privacy 1, 27\u201334 (2003)","journal-title":"IEEE Security and Privacy"},{"key":"9369_CR2","doi-asserted-by":"crossref","unstructured":"Backes, M., Doychev, G., D\u00fcrmuth, M., & K\u00f6pf, B. (2010). Speaker recognition in encrypted voice streams. ESORICS '10: Proceedings of the 15th European Symposium on Research in Computer Security, LNCS. New York: Springer","DOI":"10.1007\/978-3-642-15497-3_31"},{"key":"9369_CR3","doi-asserted-by":"crossref","unstructured":"Baugher, M., McGrew, D., Naslund, M., Carrara, E., & Norrman, K. (2004). The Secure Real-Time Transport Protocol (SRTP). RFC 3711","DOI":"10.17487\/rfc3711"},{"key":"9369_CR4","doi-asserted-by":"crossref","unstructured":"Berners-Lee, T., Fielding, R., & Masinter, L. (2005). Uniform Resource Identifier (URI): Generic Syntax. RFC 3986","DOI":"10.17487\/rfc3986"},{"key":"9369_CR5","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1007\/3-540-44702-4_7","volume-title":"International Workshop on Designing Privacy Enhancing Technologies","author":"O Berthold","year":"2001","unstructured":"Berthold, O., Federrath, H., K\u00f6psell, S.: Web mixes: A system for anonymous and unobservable internet access. International Workshop on Designing Privacy Enhancing Technologies, pp. 115\u2013129. Springer, New York, NY (2001)"},{"key":"9369_CR6","doi-asserted-by":"publisher","first-page":"271","DOI":"10.1007\/s10660-011-9078-0","volume":"11","author":"F Buccafurri","year":"2011","unstructured":"Buccafurri, F., Lax, G.: Implementing disposable credit card numbers by mobile phones. Electronic Commerce Research 11, 271\u2013296 (2011)","journal-title":"Electronic Commerce Research"},{"key":"9369_CR7","first-page":"1","volume":"1","author":"H Chang","year":"2013","unstructured":"Chang, H.: The security service rating design for it convergence services. Electronic Commerce Research 1, 1\u201312 (2013)","journal-title":"Electronic Commerce Research"},{"key":"9369_CR8","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1145\/358549.358563","volume":"24","author":"DL Chaum","year":"1981","unstructured":"Chaum, D.L.: Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM 24, 84\u201390 (1981)","journal-title":"Communications of the ACM"},{"key":"9369_CR9","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1109\/MNET.2006.1705881","volume":"20","author":"S Chen","year":"2006","unstructured":"Chen, S., Wang, X., Jajodia, S.: On the anonymity and traceability of peer-to-peer voip calls. IEEE Network 20, 32\u201337 (2006)","journal-title":"IEEE Network"},{"key":"9369_CR10","doi-asserted-by":"crossref","unstructured":"Clark, J., van Oorschot, P., & Adams,C. (2007). Usability of anonymous web browsing: an examination of tor interfaces and deployability. In Proceedings of the 3rd Symposium on Usable Privacy and Security, SOUPS '07 (pp. 41\u201351). New York, NY: ACM","DOI":"10.1145\/1280680.1280687"},{"key":"9369_CR11","doi-asserted-by":"crossref","unstructured":"Coskun, B., & Memon, N. (2010). Tracking encrypted voip calls via robust hashing of network flows. In ICASSP '10: Proceedings of the IEEE 2010 International Conference on Acoustics, Speech, and Signal Processing (pp. 1818\u20131821). IEEE","DOI":"10.1109\/ICASSP.2010.5495398"},{"key":"9369_CR12","doi-asserted-by":"crossref","unstructured":"Danezis, G. (2003). Statistical disclosure attacks. In Proceedings of the IFIP TC11 18th International Conference on Information Security (SEC '03) (pp. 421-426). Athens: Kluwer","DOI":"10.1007\/978-0-387-35691-4_40"},{"key":"9369_CR13","doi-asserted-by":"crossref","unstructured":"Danezis, G., Diaz, C., Troncoso, C., & Laurie, B. (2010). Drac: An architecture for anonymous low volume communications. In PETS '10: Proceedings of the 10th international conference on Privacy enhancing technologies (pp. 202\u2013219). Berlin: Springer","DOI":"10.1007\/978-3-642-14527-8_12"},{"key":"9369_CR14","doi-asserted-by":"crossref","unstructured":"Danezis, G., Dingledine, R., & Mathewson, N. (2003). Mixminion: Design of a type III anonymous remailer protocol. In SP '03: Proceedings of the 2003 IEEE Symposium on Security and Privacy (p. 2). Washington, DC: IEEE Computer Society","DOI":"10.1109\/SECPRI.2003.1199323"},{"key":"9369_CR15","doi-asserted-by":"crossref","unstructured":"Dierks, T., & Rescorla, E. (2008). The Transport Layer Security (TLS) Protocol Version 1.2. RFC 5246","DOI":"10.17487\/rfc5246"},{"key":"9369_CR16","doi-asserted-by":"crossref","unstructured":"Dingledine, R., Mathewson, N., & Syverson, P. (2004). Tor: The second-generation onion router. In SSYM'04: Proceedings of the 13th Conference on USENIX Security Symposium (pp. 21-21). Berkeley, CA: USENIX Association","DOI":"10.21236\/ADA465464"},{"key":"9369_CR17","unstructured":"European Commission. (2012). Proposal for a Regulation of the European Parliament and of the Council on the Protection of Indivuduals with regard to the Processinf of Personal Data and on the Free Movement of Such Data (General Data Protection Regulation). COM(2012) 11 final, Brussels"},{"key":"9369_CR18","unstructured":"Google, Facebook, Dropbox, Yahoo, Microsoft, Paltalk, AOL And Apple Deny Participation In NSA PRISM Surveillance Program. (2013). Retrived at 18 June 2013 from \n                    http:\/\/techcrunch.com\/2013\/06\/06\/google-facebook-apple-deny-participation-in-nsa-prism-program\/"},{"key":"9369_CR19","doi-asserted-by":"crossref","unstructured":"Handley, M., & Jacobson, V. (1998). SDP: Session description protocol. RFC 2327","DOI":"10.17487\/rfc2327"},{"key":"9369_CR20","doi-asserted-by":"publisher","first-page":"301","DOI":"10.1016\/j.csi.2010.07.002","volume":"33","author":"G Karopoulos","year":"2011","unstructured":"Karopoulos, G., Kambourakis, G., Gritzalis, S.: PrivaSIP: Ad-hoc identity privacy in SIP. Computer Standards & Interfaces 33, 301\u2013314 (2011)","journal-title":"Computer Standards & Interfaces"},{"key":"9369_CR21","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1016\/j.jnca.2009.07.004","volume":"33","author":"G Karopoulos","year":"2010","unstructured":"Karopoulos, G., Kambourakis, G., Gritzalis, S., Konstantinou, E.: A framework for identity privacy in SIP. Journal of Network and Computer Applications 33, 16\u201328 (2010)","journal-title":"Journal of Network and Computer Applications"},{"key":"9369_CR22","doi-asserted-by":"crossref","unstructured":"Kent, S., & Seo, K. (2005). Security architecture for the internet protocol. RFC 4301","DOI":"10.17487\/rfc4301"},{"key":"9369_CR23","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1016\/j.diin.2009.10.001","volume":"7","author":"L Khan","year":"2010","unstructured":"Khan, L., Baig, M., Youssef, A.M.: Speaker recognition from encrypted voip communications. Digital Investigation 7, 65\u201373 (2010)","journal-title":"Digital Investigation"},{"key":"9369_CR24","unstructured":"Levine, B. N., Reiter, M. K., Wang, C., & Wright, M. (2004). Timing attacks in low-latency mix systems (extended abstract). In FC '04: Proceedings of the 8th International Conference on Financial Cryptography (pp. 251\u2013265). Berlin: Springer"},{"key":"9369_CR25","doi-asserted-by":"publisher","first-page":"341","DOI":"10.1016\/j.jnca.2010.06.009","volume":"34","author":"M Liberatore","year":"2011","unstructured":"Liberatore, M., Gurung, B., Levine, B.N., Wright, M.: Empirical tests of anonymous voice over IP. Journal of Network and Computer Applications 34, 341\u2013350 (2011)","journal-title":"Journal of Network and Computer Applications"},{"key":"9369_CR26","doi-asserted-by":"crossref","unstructured":"Lu, Y., & Zhu, Y. (2010). Correlation-based traffic analysis on encrypted voip traffic. In NSWCTC '10: Proceedings of the 2010 Second International Conference on Networks Security, Wireless Communications and Trusted Computing (pp. 45\u201348). Washington, DC: IEEE Computer Society","DOI":"10.1109\/NSWCTC.2010.265"},{"key":"9369_CR27","doi-asserted-by":"crossref","unstructured":"Mahy, R., Matthews, P., Rosenberg, J. (2010). Traversal using relays around nat (turn): Relay extensions to session traversal utilities for nat (stun). RFC 5766","DOI":"10.17487\/rfc5766"},{"key":"9369_CR28","doi-asserted-by":"crossref","unstructured":"Melchor, C. A., Deswarte, Y., & Iguchi-Cartigny, J. (2007). Closed-circuit unobservable voice over IP. In ACSAC '07: Proceedings of the 23rd Computer Security Applications Conference (pp. 119\u2013128). IEEE","DOI":"10.1109\/ACSAC.2007.34"},{"key":"9369_CR29","doi-asserted-by":"crossref","unstructured":"Munakata, M., Schubert, S., & Ohba, T. (2010). User-agent-driven privacy mechanism for sip. RFC 5767","DOI":"10.17487\/rfc5767"},{"key":"9369_CR30","unstructured":"Steiner, P. (1993). On the Internet, nobody knows you're a dog., The New Yorker (p. 61)"},{"key":"9369_CR31","doi-asserted-by":"crossref","unstructured":"Peterson, J. (2002). A privacy mechanism for the session initiation protocol (SIP). RFC 3323","DOI":"10.17487\/rfc3323"},{"key":"9369_CR32","unstructured":"Pfitzmann, A., & Hansen, M. (2010). A terminology for talking about privacy by data minimization: Anonymity, unlinkability, undetectability, unobservability, pseudonymity, and identity management. \n                    http:\/\/dud.inf.tu-dresden.de\/literatur\/Anon_Terminology_v0.34.pdf\n                    \n                  , v0.34"},{"key":"9369_CR33","doi-asserted-by":"crossref","unstructured":"Pfitzmann, A., Pfitzmann, B., & Waidner, M. (1991). ISDN-MIXes: Untraceable communication with small bandwidth overhead. Kommunikation in Verteilten Systemen, Grundlagen, Anwendungen, Betrieb, GI\/ITG-Fachtagung, pp. 451-463. London: Springer","DOI":"10.1007\/978-3-642-76462-2_32"},{"key":"9369_CR34","unstructured":"Ramsdell, B., & Turner, S. (2010). Secure\/Multipurpose Internet Mail Extensions (S\/MIME) Version 3.2 Message Specification. RFC 5751"},{"key":"9369_CR35","unstructured":"Recommendation G.114: One-way Transmission Time. (2013). Retrived at 21 July, 2013 from \n                    http:\/\/www.itu.int\/itudoc\/itu-t\/aap\/sg12aap\/history\/g.114\/index.html"},{"key":"9369_CR36","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1023\/B:ELEC.0000009283.82564.25","volume":"4","author":"M Rennhard","year":"2004","unstructured":"Rennhard, M., Rafaeli, S., Mathy, L., Plattner, B., Hutchison, D.: Towards pseudonymous e-commerce. Electronic Commerce Research 4, 83\u2013111 (2004)","journal-title":"Electronic Commerce Research"},{"key":"9369_CR37","doi-asserted-by":"crossref","unstructured":"Rosenberg, J. (2009). Obtaining and using globally routable user agent uris (gruus) in the session initiation protocol (sip). RFC 5627","DOI":"10.17487\/rfc5627"},{"key":"9369_CR38","doi-asserted-by":"crossref","unstructured":"Rosenberg, J., Schulzrinne, H., Camarillo, G., Johnston, A., Peterson, J., Sparks, R., Handley, M., & Schooler, E. (2002). SIP: Session initiation protocol. RFC 3261","DOI":"10.17487\/rfc3261"},{"key":"9369_CR39","unstructured":"Schulzrinne, H., Casner, S., Frederick, R., & Jacobson, V. (2003). RTP: A transport protocol for realtime applications. RFC 3550"},{"key":"9369_CR40","doi-asserted-by":"crossref","unstructured":"Schulzrinne, H., & Taylor, T. (2006). RTP payload for DTMF digits, telephony tones, and telephony signals. RFC 4733","DOI":"10.17487\/rfc4733"},{"key":"9369_CR41","doi-asserted-by":"crossref","unstructured":"Sengar, H., Ren, Z., Wang, H., Wijesekera, D., & Jajodia, S. (2010). Tracking skype voip calls over the internet. In INFOCOM '10: Proceedings of the 30th IEEE Conference on Computer Communications (pp. 1\u20135). Washington, DC: IEEE Computer Society","DOI":"10.1109\/INFCOM.2010.5462266"},{"key":"9369_CR42","first-page":"3844","volume":"57","author":"C Shen","year":"2006","unstructured":"Shen, C., Schulzrinne, H.: A VoIP privacy mechanism and its application in VoIP peering for voice service provider topology and identity hiding. ICC 57, 3844\u20133849 (2006)","journal-title":"ICC"},{"key":"9369_CR43","unstructured":"Skype. (2013). Retrived at 11 June, 2013 from \n                    http:\/\/www.Skype.com"},{"key":"9369_CR44","unstructured":"Skype Security, Skype Homepage. (2013). Retrived 21 July, 2013 from \n                    https:\/\/support.skype.com\/en-us\/faq\/FA31\/Does-Skype-use-encryption"},{"key":"9369_CR45","doi-asserted-by":"publisher","first-page":"621","DOI":"10.1109\/TPDS.2010.122","volume":"22","author":"M Srivatsa","year":"2011","unstructured":"Srivatsa, M., Iyengar, A., Liu, L., Jiang, H.: Privacy in voip networks: Flow analysis attacks and defense. IEEE Transactions on Parallel and Distributed Systems 22, 621\u2013633 (2011)","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"key":"9369_CR46","doi-asserted-by":"crossref","unstructured":"Srivatsa, M., Liu, L., & Iyengar, A. (2008). Preserving caller anonymity in voice-over-ip networks. In SP '08: Proceedings of the 29th IEEE Symposium on Security and Privacy (pp. 50\u201363). Washington, DC: IEEE Computer Society","DOI":"10.1109\/SP.2008.10"},{"key":"9369_CR47","doi-asserted-by":"crossref","unstructured":"Srivatsa, M., Liu, L., & Iyengar, A. (2009). Privacy in voip networks: A k-anonymity approach. In INFOCOM'09: Proceedings of the 29th IEEEConference on Computer Communications. Washington, DC: IEEE Computer Society","DOI":"10.1109\/INFCOM.2009.5062246"},{"key":"9369_CR48","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1142\/S0218488502001648","volume":"5","author":"L Sweeney","year":"2002","unstructured":"Sweeney, L.: k-Anonymity: A model for protecting privacy. International Journal on Uncertainty, Fuzziness and Knowledge-based Systems 5, 557\u2013570 (2002)","journal-title":"International Journal on Uncertainty, Fuzziness and Knowledge-based Systems"},{"key":"9369_CR49","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1007\/s10660-009-9036-2","volume":"9","author":"D Taylor","year":"2009","unstructured":"Taylor, D., Davis, D., Jillapalli, R.: Privacy concern and online personalization: The moderating effects of information control and compensation. Electronic Commerce Research 9, 203\u2013223 (2009)","journal-title":"Electronic Commerce Research"},{"key":"9369_CR50","unstructured":"TORFone. (2013). Retrivd 18 June, 2013 \n                    http:\/\/torfone.org\/"},{"key":"9369_CR51","unstructured":"US: No Plans to End Broad Surveillance Program. (2013). Retrived at 18 June, 2013 from \n                    http:\/\/thedailyreview.com\/news\/us-no-plans-to-end-broad-surveillance-program-1.1503405"},{"key":"9369_CR52","doi-asserted-by":"crossref","unstructured":"Verscheure, O., Vlachos, M., Anagnostopoulos, A., Frossard, P., Bouillet, E., & Yu, P. S. (2006). Finding ``who is talking to whom\" in voip networks via progressive stream clustering. In ICDM '06: Proceedings of the 6th International Conference on Data Mining (pp. 667\u2013677). Washington, DC: IEEE Computer Society","DOI":"10.1109\/ICDM.2006.72"},{"key":"9369_CR53","doi-asserted-by":"crossref","unstructured":"Wang, X., Chen, S., & Jajodia, S. (2005). Tracking anonymous peer-to-peer voip calls on the internet. In CCS '05: Proceedings of the 12th ACM Conference on Computer and Communications Security (pp. 81\u201391). New York, NY: ACM","DOI":"10.1145\/1102120.1102133"},{"key":"9369_CR54","unstructured":"Wright, C. V., Ballard, L.,Monrose, F., & Masson, G. M. (2007). Language identification of encrypted voip traffic: Alejandra y roberto or alice and bob? In Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium, SS'07 (pp. 1\u201312). Berkeley, CA: USENIX Association"},{"key":"9369_CR55","unstructured":"Wright, C. V., Coull, S. E., & Monrose, F. (2009). Traffic morphing: An efficient defense against statistical traffic analysis. In Proceedings of the 16th Annual Network & Distributed System Security Symposium, NDSS '09, ISOC"},{"key":"9369_CR56","doi-asserted-by":"publisher","first-page":"151","DOI":"10.1007\/s10660-013-9111-6","volume":"13","author":"F Xu","year":"2013","unstructured":"Xu, F., Michael, K., Chen, X.: Factors affecting privacy disclosure on social network sites: An integrated model. Electronic Commerce Research 13, 151\u2013168 (2013)","journal-title":"Electronic Commerce Research"},{"key":"9369_CR57","first-page":"198","volume-title":"Proceings of the 5th IFIP Privacy and Identity Summer School","author":"G Zhang","year":"2010","unstructured":"Zhang, G.: An analysis for anonymity and unlinkability for a voip conversation. Proceings of the 5th IFIP Privacy and Identity Summer School, pp. 198\u2013212. Springer, Berlin (2010)"},{"key":"9369_CR58","unstructured":"Zhang, G. (2011). Analyzing keystroke patterns of pin code input for recognizing voip users. In: IFIP Future Challenges in Security and Privacy for Academia and Industry, SEC '11. New York, NY: Springer IFIP"},{"key":"9369_CR59","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1145\/1941530.1941533","volume-title":"Principles, Systems and Applications of IP Telecommunications, IPTComm '10","author":"G Zhang","year":"2010","unstructured":"Zhang, G., Berthold, S.: Hidden voip calling records from networking intermediaries. Principles, Systems and Applications of IP Telecommunications, IPTComm '10, pp. 12\u201321. ACM, New York, NY (2010)"},{"key":"9369_CR60","doi-asserted-by":"crossref","unstructured":"Zhang, G., & Fischer-H\u00fcbner, S. (2010). Peer-to-peer VoIP communications using anonymisation overlay networks. In Proceedings of the 11th IFIP TC6, TC11 International Conference on Communications and Multimedia Security, CMS '10 (pp. 130\u2013141). LNCS 6109. New York: Springer","DOI":"10.1007\/978-3-642-13241-4_13"},{"key":"9369_CR61","unstructured":"Zhu,Y. (2010). On privacy leakage through silence suppression. In Proceedings of the 13th Information Security Conference, ISC '10 (pp. 276\u2013282). New York: Springer LNCS"},{"issue":"10","key":"9369_CR62","doi-asserted-by":"publisher","first-page":"1202","DOI":"10.1016\/j.comcom.2010.12.007","volume":"34","author":"Y Zhu","year":"2011","unstructured":"Zhu, Y., H, Fu. Traffic analysis attacks on skype VoIP calls. Computer Communications 34(10), 1202\u20131212 (2011)","journal-title":"Computer Communications"},{"key":"9369_CR63","doi-asserted-by":"crossref","unstructured":"Zopf, R. (2002). Real-time transport protocol (RTP) payload for comfort noise (CN). RFC 3389","DOI":"10.17487\/rfc3389"}],"container-title":["Electronic Commerce Research"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10660-019-09369-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10660-019-09369-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10660-019-09369-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,10]],"date-time":"2020-08-10T19:15:22Z","timestamp":1597086922000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10660-019-09369-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,8,12]]},"references-count":63,"aliases":["10.1007\/s10660-014-9157-0"],"journal-issue":{"issue":"3","published-print":{"date-parts":[[2019,9,15]]}},"alternative-id":["9369"],"URL":"https:\/\/doi.org\/10.1007\/s10660-019-09369-0","relation":{},"ISSN":["1389-5753","1572-9362"],"issn-type":[{"value":"1389-5753","type":"print"},{"value":"1572-9362","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,8,12]]},"assertion":[{"value":"12 August 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}