{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T00:51:19Z","timestamp":1740099079798,"version":"3.37.3"},"publisher-location":"Cham","reference-count":24,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319983844"},{"type":"electronic","value":"9783319983851"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-98385-1_5","type":"book-chapter","created":{"date-parts":[[2018,7,25]],"date-time":"2018-07-25T23:47:49Z","timestamp":1532562469000},"page":"57-68","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Evaluating the Privacy Properties of Secure VoIP Metadata"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0125-4240","authenticated-orcid":false,"given":"Jo\u00e3o S.","family":"Resende","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0268-9134","authenticated-orcid":false,"given":"Patr\u00edcia R.","family":"Sousa","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9988-594X","authenticated-orcid":false,"given":"Lu\u00eds","family":"Antunes","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,7,27]]},"reference":[{"issue":"2","key":"5_CR1","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1007\/s10207-017-0362-4","volume":"17","author":"A Gruber","year":"2018","unstructured":"Gruber, A., Ben-Gal, I.: Using targeted Bayesian network learning for suspect identification in communication networks. Int. J. Inf. Secur. 17(2), 169\u2013181 (2018)","journal-title":"Int. J. Inf. Secur."},{"issue":"7","key":"5_CR2","doi-asserted-by":"publisher","first-page":"e98790","DOI":"10.1371\/journal.pone.0098790","volume":"9","author":"Y-A Montjoye de","year":"2014","unstructured":"de Montjoye, Y.-A., et al.: openPDS: protecting the privacy of metadata through safeanswers. PloS One 9(7), e98790 (2014)","journal-title":"PloS One"},{"key":"5_CR3","unstructured":"LinPhone Open source VOIP project (2017). http:\/\/www.linphone.org\/ . Accessed 29 Mar 2018"},{"key":"5_CR4","unstructured":"Moscaritolo, V., Belvin, G., Zimmermann, P.: Silent circle instant messaging protocol protocol specification. Online, White Paper (2012)"},{"key":"5_CR5","unstructured":"Silent Circle (2018). https:\/\/www.silentcircle.com\/ . Accessed 29 Mar 2018"},{"key":"5_CR6","doi-asserted-by":"crossref","unstructured":"Zimmermann, P., Johnston, A., Callas, J.: ZRTP: media path key agreement for unicast secure RTP. No. RFC 6189 (2011)","DOI":"10.17487\/rfc6189"},{"key":"5_CR7","doi-asserted-by":"crossref","unstructured":"Greschbach, B., Kreitz, G., Buchegger, S.: The devil is in the metadata\u2014new privacy challenges in decentralised online social networks. In: 2012 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops). IEEE (2012)","DOI":"10.1109\/PerComW.2012.6197506"},{"issue":"3","key":"5_CR8","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1109\/MMUL.2005.50","volume":"12","author":"J Tesic","year":"2005","unstructured":"Tesic, J.: Metadata practices for consumer photos. IEEE MultiMed. 12(3), 86\u201392 (2005)","journal-title":"IEEE MultiMed."},{"issue":"20","key":"5_CR9","doi-asserted-by":"publisher","first-page":"5536","DOI":"10.1073\/pnas.1508081113","volume":"113","author":"J Mayer","year":"2016","unstructured":"Mayer, J., Mutchler, P., Mitchell, J.C.: Evaluating the privacy properties of telephone metadata. Proc. Nat. Acad. Sci. 113(20), 5536\u20135541 (2016)","journal-title":"Proc. Nat. Acad. Sci."},{"key":"5_CR10","first-page":"2014","volume":"10","author":"D Cole","year":"2014","unstructured":"Cole, D.: We kill people based on metadata. New York Rev. Books 10, 2014 (2014)","journal-title":"New York Rev. Books"},{"issue":"21","key":"5_CR11","doi-asserted-by":"publisher","first-page":"9795","DOI":"10.1007\/s11042-014-2151-7","volume":"74","author":"M Furini","year":"2015","unstructured":"Furini, M., Tamanini, V.: Location privacy and public metadata in social media platforms: attitudes, behaviors and opinions. Multimed. Tools Appl. 74(21), 9795\u20139825 (2015)","journal-title":"Multimed. Tools Appl."},{"issue":"6221","key":"5_CR12","doi-asserted-by":"publisher","first-page":"536","DOI":"10.1126\/science.1256297","volume":"347","author":"Y-A Montjoye de","year":"2015","unstructured":"de Montjoye, Y.-A., Radaelli, L., Singh, V.K.: Unique in the shopping mall: on the reidentifiability of credit card metadata. Science 347(6221), 536\u2013539 (2015)","journal-title":"Science"},{"key":"5_CR13","doi-asserted-by":"crossref","unstructured":"Narayanan, A., Shmatikov, V.: Robust de-anonymization of large sparse datasets. In: IEEE Symposium on Security and Privacy, SP 2008. IEEE (2008)","DOI":"10.1109\/SP.2008.33"},{"key":"5_CR14","unstructured":"Scapy: the Python-based interactive packet manipulation program and library (2015). https:\/\/github.com\/secdev\/scapy\/"},{"issue":"3","key":"5_CR15","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1515\/popets-2017-0025","volume":"2017","author":"D Schrmann","year":"2017","unstructured":"Schrmann, D., et al.: Wiretapping end-to-end encrypted VoIP calls: real-world attacks on ZRTP. Proc. Priv. Enhanc. Technol. 2017(3), 4\u201320 (2017)","journal-title":"Proc. Priv. Enhanc. Technol."},{"issue":"5","key":"5_CR16","first-page":"673","volume":"14","author":"M Petraschek","year":"2008","unstructured":"Petraschek, M., et al.: Security and usability aspects of man-in-the-middle attacks on ZRTP. J. UCS 14(5), 673\u2013692 (2008)","journal-title":"J. UCS"},{"key":"5_CR17","unstructured":"Werner Dittmann, ZRTPCPP (2018). https:\/\/github.com\/wernerd\/ZRTPCPP"},{"key":"5_CR18","unstructured":"PJSIP version, teluu. http:\/\/www.pjsip.org\/"},{"issue":"107","key":"5_CR19","doi-asserted-by":"publisher","first-page":"20150185","DOI":"10.1098\/rsif.2015.0185","volume":"12","author":"JL Toole","year":"2015","unstructured":"Toole, J.L., et al.: Tracking employment shocks using mobile phone data. J. Roy. Soc. Interface 12(107), 20150185 (2015)","journal-title":"J. Roy. Soc. Interface"},{"key":"5_CR20","doi-asserted-by":"crossref","unstructured":"Arai, A., et al.: Understanding user attributes from calling behavior: exploring call detail records through field observations. In: Proceedings of the 12th International Conference on Advances in Mobile Computing and Multimedia. ACM (2014)","DOI":"10.1145\/2684103.2684107"},{"key":"5_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1007\/978-3-642-37210-0_6","volume-title":"Social Computing, Behavioral-Cultural Modeling and Prediction","author":"Y-A Montjoye de","year":"2013","unstructured":"de Montjoye, Y.-A., Quoidbach, J., Robic, F., Pentland, A.S.: Predicting personality using novel mobile phone-based metrics. In: Greenberg, A.M., Kennedy, W.G., Bos, N.D. (eds.) SBP 2013. LNCS, vol. 7812, pp. 48\u201355. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-37210-0_6"},{"issue":"3","key":"5_CR22","doi-asserted-by":"publisher","first-page":"433","DOI":"10.1007\/s00779-011-0490-1","volume":"17","author":"G Chittaranjan","year":"2013","unstructured":"Chittaranjan, G., Blom, J., Gatica-Perez, D.: Mining large-scale smartphone data for personality studies. Pers. Ubiquit. Comput. 17(3), 433\u2013450 (2013)","journal-title":"Pers. Ubiquit. Comput."},{"issue":"6","key":"5_CR23","doi-asserted-by":"publisher","first-page":"823","DOI":"10.1016\/j.pmcj.2013.07.009","volume":"9","author":"E Zhong","year":"2013","unstructured":"Zhong, E., et al.: User demographics prediction based on mobile data. Pervasive Mobile Comput. 9(6), 823\u2013837 (2013)","journal-title":"Pervasive Mobile Comput."},{"issue":"1","key":"5_CR24","doi-asserted-by":"publisher","first-page":"3","DOI":"10.3390\/cryptography2010003","volume":"2","author":"D Alvanos","year":"2018","unstructured":"Alvanos, D., Limniotis, K., Stavrou, S.: On the cryptographic features of a VoIP service. Cryptography 2(1), 3 (2018)","journal-title":"Cryptography"}],"container-title":["Lecture Notes in Computer Science","Trust, Privacy and Security in Digital Business"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-98385-1_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,21]],"date-time":"2019-10-21T04:32:10Z","timestamp":1571632330000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-98385-1_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319983844","9783319983851"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-98385-1_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]}}}