{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,10]],"date-time":"2026-01-10T18:14:17Z","timestamp":1768068857324,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":34,"publisher":"ACM","license":[{"start":{"date-parts":[[2005,11,7]],"date-time":"2005-11-07T00:00:00Z","timestamp":1131321600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2005,11,7]]},"DOI":"10.1145\/1102120.1102133","type":"proceedings-article","created":{"date-parts":[[2006,2,6]],"date-time":"2006-02-06T15:52:40Z","timestamp":1139241160000},"page":"81-91","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":127,"title":["Tracking anonymous peer-to-peer VoIP calls on the internet"],"prefix":"10.1145","author":[{"given":"Xinyuan","family":"Wang","sequence":"first","affiliation":[{"name":"George Mason University, Fairfax, VA"}]},{"given":"Shiping","family":"Chen","sequence":"additional","affiliation":[{"name":"George Mason University, Fairfax, VA"}]},{"given":"Sushil","family":"Jajodia","sequence":"additional","affiliation":[{"name":"George Mason University, Fairfax, VA"}]}],"member":"320","published-online":{"date-parts":[[2005,11,7]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Anonymizer. http:\/\/www.anonymizer.com  Anonymizer. http:\/\/www.anonymizer.com"},{"key":"e_1_3_2_1_2_1","volume-title":"IETF","author":"Arango M.","year":"1999","unstructured":"M. Arango , A. Dugan , I. Elliott , C. Huitema and S. Pickett . RFC 2705: Media Gateway Control Protocol (MGCP) Version 1.0 . IETF , October 1999 . M. Arango, A. Dugan, I. Elliott, C. Huitema and S. Pickett. RFC 2705: Media Gateway Control Protocol (MGCP) Version 1.0. IETF, October 1999."},{"key":"e_1_3_2_1_3_1","volume-title":"Freedom 2.1 Security Issues and Analysis. Zero-Knowledge Systems","author":"Back A.","year":"2001","unstructured":"A. Back , I. Goldberg , and A. Shostack . Freedom 2.1 Security Issues and Analysis. Zero-Knowledge Systems , Inc . white paper, May 2001 A. Back, I. Goldberg, and A. Shostack. Freedom 2.1 Security Issues and Analysis. Zero-Knowledge Systems, Inc. white paper, May 2001"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30143-1_14"},{"key":"e_1_3_2_1_6_1","volume-title":"N. Mathewson and and P. Syverson. Tor: The Second Generation Onion Router. In Proceedings of the 13th USENIX Security Symposium","author":"Dingledine R.","year":"2000","unstructured":"R. Dingledine , N. Mathewson and and P. Syverson. Tor: The Second Generation Onion Router. In Proceedings of the 13th USENIX Security Symposium , August 2000 . R. Dingledine, N. Mathewson and and P. Syverson. Tor: The Second Generation Onion Router. In Proceedings of the 13th USENIX Security Symposium, August 2000."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.5555\/1754701.1754704"},{"key":"e_1_3_2_1_8_1","unstructured":"FBI. Letter to FCC http:\/\/www.askcalea.com\/docs\/20040128.jper.letter.pdf  FBI. Letter to FCC http:\/\/www.askcalea.com\/docs\/20040128.jper.letter.pdf"},{"key":"e_1_3_2_1_9_1","volume-title":"ET Docket No. 04--295, FCC 04--187. In Federal Register at 69 Fed. Reg.","author":"Federal Communications Commission","year":"2004","unstructured":"Federal Communications Commission . Notice of Proposed Rulemaking (NPRM) and Declaratory Ruling RM-10865 , ET Docket No. 04--295, FCC 04--187. In Federal Register at 69 Fed. Reg. 56956, August , 2004 . Federal Communications Commission. Notice of Proposed Rulemaking (NPRM) and Declaratory Ruling RM-10865, ET Docket No. 04--295, FCC 04--187. In Federal Register at 69 Fed. Reg. 56956, August, 2004."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/352600.352606"},{"key":"e_1_3_2_1_11_1","unstructured":"Findnot. http:\/\/www.findnot.com  Findnot. http:\/\/www.findnot.com"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/586110.586137"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/293411.293443"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/586110.586128"},{"key":"e_1_3_2_1_15_1","unstructured":"ITU-T Recommendation H.323v.4 Packet-based Multimedia Communications Systems. November 2000.  ITU-T Recommendation H.323v.4 Packet-based Multimedia Communications Systems. November 2000."},{"key":"e_1_3_2_1_16_1","unstructured":"Kazaa. http:\/\/www.kazaa.com\/  Kazaa. http:\/\/www.kazaa.com\/"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2005.18"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-27809-2_25"},{"key":"e_1_3_2_1_19_1","volume-title":"Proceedings of the 2004 IEEE Symposium on Security and Privacy, IEEE","author":"Li J.","year":"2004","unstructured":"J. Li , M. Sung , J. Xu and L. Li . Large Scale IP Traceback in High-Speed Internet: Practical Techniques and Theoretical Foundation . In Proceedings of the 2004 IEEE Symposium on Security and Privacy, IEEE , 2004 . J. Li, M. Sung, J. Xu and L. Li. Large Scale IP Traceback in High-Speed Internet: Practical Techniques and Theoretical Foundation. In Proceedings of the 2004 IEEE Symposium on Security and Privacy, IEEE, 2004."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2005.12"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.5555\/645662.664536"},{"key":"e_1_3_2_1_22_1","volume-title":"IETF","author":"Rosenberg J.","year":"2002","unstructured":"J. Rosenberg , H. Schulzrinne , G. Camarillo , A. R. Johnston , J. Peterson , R. Sparks , M. Handley , and E. Schooler . RFC 3261: SIP: Session Initiation Protocol . IETF , June 2002 . J. Rosenberg, H. Schulzrinne, G. Camarillo, A. R. Johnston, J. Peterson, R. Sparks, M. Handley, and E. Schooler. RFC 3261: SIP: Session Initiation Protocol. IETF, June 2002."},{"key":"e_1_3_2_1_23_1","unstructured":"RTAI. http:\/\/www.rtai.org  RTAI. http:\/\/www.rtai.org"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/347059.347560"},{"key":"e_1_3_2_1_25_1","volume-title":"CRC","author":"Schulzrinne H.","year":"2004","unstructured":"H. Schulzrinne . Internet Telephony. In Practical Handbook of Internet Computing , CRC , 2004 H. Schulzrinne. Internet Telephony. In Practical Handbook of Internet Computing, CRC, 2004"},{"key":"e_1_3_2_1_26_1","first-page":"83","volume-title":"Proceedings of International Workshop on Network and Operating System Support for Digital Audio and Video (NOSSDAV 1998","author":"Schulzrinne H.","year":"1998","unstructured":"H. Schulzrinne and J. Rosenberg . A Comparison of SIP and H.323 for Internet Telephony . In Proceedings of International Workshop on Network and Operating System Support for Digital Audio and Video (NOSSDAV 1998 ), pages 83 -- 86 , Cambridge, England , July 1998 . H. Schulzrinne and J. Rosenberg. A Comparison of SIP and H.323 for Internet Telephony. In Proceedings of International Workshop on Network and Operating System Support for Digital Audio and Video (NOSSDAV 1998), pages 83--86, Cambridge, England, July 1998."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.5555\/876901.881221"},{"key":"e_1_3_2_1_28_1","unstructured":"Skype - the Global Internet Telephony Company. http:\/\/www.skype.org  Skype - the Global Internet Telephony Company. http:\/\/www.skype.org"},{"key":"e_1_3_2_1_29_1","first-page":"167","volume-title":"Proceedings of the 14th National Computer Security Conference","author":"Snapp S.","year":"1991","unstructured":"S. Snapp , J. Brentano , G. V. Dias , T. L. Goan , L. T. Heberlein , C. Ho , K. N. Levitt , B. Mukherjee , S. E. Smaha1, T. Grance , D. M. Teal , and D. Mansur . DIDS (Distributed Intrusion Detection System) - Motivation, Architecture, and Early Prototype . In Proceedings of the 14th National Computer Security Conference , pages 167 -- 176 , 1991 . S. Snapp, J. Brentano, G. V. Dias, T. L. Goan, L. T. Heberlein, C. Ho, K. N. Levitt, B. Mukherjee, S. E. Smaha1, T. Grance, D. M. Teal, and D. Mansur. DIDS (Distributed Intrusion Detection System) - Motivation, Architecture, and Early Prototype. In Proceedings of the 14th National Computer Security Conference, pages 167--176, 1991."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/383059.383060"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.5555\/882491.884246"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/948109.948115"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.5555\/646649.699363"},{"key":"e_1_3_2_1_34_1","first-page":"191","volume-title":"Proceedings of the 6th European Symposium on Research in Computer Security (ESORICS 2000","author":"Yoda K.","year":"1895","unstructured":"K. Yoda and H. Etoh . Finding a Connection Chain for Tracing Intruders . In Proceedings of the 6th European Symposium on Research in Computer Security (ESORICS 2000 ), LNCS- 1895 , pages 191 -- 205 . Springer-Verlag , October 2002. K. Yoda and H. Etoh. Finding a Connection Chain for Tracing Intruders. In Proceedings of the 6th European Symposium on Research in Computer Security (ESORICS 2000), LNCS-1895, pages 191--205. Springer-Verlag, October 2002."},{"key":"e_1_3_2_1_35_1","first-page":"171","volume-title":"Proceedings of the 9th USENIX Security Symposium","author":"Zhang Y.","year":"2000","unstructured":"Y. Zhang and V. Paxson . Detecting Stepping Stones . In Proceedings of the 9th USENIX Security Symposium , pages 171 -- 184 . USENIX, 2000 . Y. Zhang and V. Paxson. Detecting Stepping Stones. In Proceedings of the 9th USENIX Security Symposium, pages 171--184. USENIX, 2000."}],"event":{"name":"CCS05: 12th ACM Conference on Computer and Communications Security 2005","location":"Alexandria VA USA","acronym":"CCS05","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","ACM Association for Computing Machinery"]},"container-title":["Proceedings of the 12th ACM conference on Computer and communications security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1102120.1102133","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1102120.1102133","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T16:08:07Z","timestamp":1750262887000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1102120.1102133"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005,11,7]]},"references-count":34,"alternative-id":["10.1145\/1102120.1102133","10.1145\/1102120"],"URL":"https:\/\/doi.org\/10.1145\/1102120.1102133","relation":{},"subject":[],"published":{"date-parts":[[2005,11,7]]},"assertion":[{"value":"2005-11-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}