{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,11]],"date-time":"2026-04-11T13:06:14Z","timestamp":1775912774365,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":17,"publisher":"ACM","license":[{"start":{"date-parts":[[2007,8,27]],"date-time":"2007-08-27T00:00:00Z","timestamp":1188172800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2007,8,27]]},"DOI":"10.1145\/1282380.1282386","type":"proceedings-article","created":{"date-parts":[[2012,10,11]],"date-time":"2012-10-11T11:35:23Z","timestamp":1349955323000},"page":"37-48","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":121,"title":["Revealing skype traffic"],"prefix":"10.1145","author":[{"given":"Dario","family":"Bonfiglio","sequence":"first","affiliation":[{"name":"Politecnico di Torino, Torino, Italy"}]},{"given":"Marco","family":"Mellia","sequence":"additional","affiliation":[{"name":"Politecnico di Torino, Torino, Italy"}]},{"given":"Michela","family":"Meo","sequence":"additional","affiliation":[{"name":"Politecnico di Torino, Torino, Italy"}]},{"given":"Dario","family":"Rossi","sequence":"additional","affiliation":[{"name":"ENST T\u00e9l\u00e9com Paris, Paris, France"}]},{"given":"Paolo","family":"Tofanelli","sequence":"additional","affiliation":[{"name":"Motorola Inc., Torino, Italy"}]}],"member":"320","published-online":{"date-parts":[[2007,8,27]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Skype web site http:\/\/www.skype.com  Skype web site http:\/\/www.skype.com"},{"key":"e_1_3_2_1_2_1","unstructured":"Hesiod \"Theogony\" ca 700 BC  Hesiod \"Theogony\" ca 700 BC"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2006.312"},{"key":"e_1_3_2_1_4_1","volume-title":"Black Hat Europe'06","author":"Biondi P.","year":"2006","unstructured":"P. Biondi , F. Desclaux , \"Silver Needle in the Skype\". Black Hat Europe'06 , Amsterdam , the Netherlands , Mar. 2006 . P. Biondi, F. Desclaux, \"Silver Needle in the Skype\". Black Hat Europe'06, Amsterdam, the Netherlands, Mar. 2006."},{"key":"e_1_3_2_1_5_1","volume-title":"5th Intl. Workshop on Peer-to-Peer Systems","author":"Guha S.","year":"2006","unstructured":"S. Guha , N. Daswani and R. Jain , \" An Experimental Study of the Skype Peer-to-Peer VoIP System \", 5th Intl. Workshop on Peer-to-Peer Systems , Santa Barbara, CA , Feb. 2006 . S. Guha, N. Daswani and R. Jain, \"An Experimental Study of the Skype Peer-to-Peer VoIP System\", 5th Intl. Workshop on Peer-to-Peer Systems, Santa Barbara, CA, Feb. 2006."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1159913.1159959"},{"key":"e_1_3_2_1_7_1","volume-title":"IEEE Infocom'06","author":"Suh K.","year":"2006","unstructured":"K. Suh , D. R. Figuieredo , J. Kurose , D. Towsley , \"Characterizing and detecting relayed traffic: A case study using Skype \", IEEE Infocom'06 , Barcelona, Spain , Apr. 2006 . K. Suh, D. R. Figuieredo, J. Kurose, D. Towsley, \"Characterizing and detecting relayed traffic: A case study using Skype\", IEEE Infocom'06, Barcelona, Spain, Apr. 2006."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/956993.957007"},{"key":"e_1_3_2_1_9_1","unstructured":"GlobalIPSound web site http:\/\/www.globalipsound.com\/  GlobalIPSound web site http:\/\/www.globalipsound.com\/"},{"key":"e_1_3_2_1_10_1","unstructured":"T. Berson \"Skype Security Evaluation\". Online report http:\/\/www.skype.com\/security\/files\/2005-031securityevaluation.pdf Oct.2005.  T. Berson \"Skype Security Evaluation\". Online report http:\/\/www.skype.com\/security\/files\/2005-031securityevaluation.pdf Oct.2005."},{"key":"e_1_3_2_1_11_1","volume-title":"A Bayesian Tutorial","author":"Sivia D. S.","year":"1996","unstructured":"D. S. Sivia , \"Data Analysis : A Bayesian Tutorial \". Oxford University Press , Sep. 1996 . D. S. Sivia, \"Data Analysis: A Bayesian Tutorial\". Oxford University Press, Sep. 1996."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1071690.1064220"},{"key":"e_1_3_2_1_13_1","unstructured":"FastWeb web site http:\/\/company.fastweb.it\/  FastWeb web site http:\/\/company.fastweb.it\/"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2004.06.026"},{"key":"e_1_3_2_1_15_1","volume-title":"RFC","author":"Schulzrinne H.","year":"2003","unstructured":"H. Schulzrinne , S. Casner , R. Frederick , V. Jacobson , \"RTP : A Transport Protocol for Real-Time Applications \", RFC 3550, Jul. 2003 . H. Schulzrinne, S. Casner, R. Frederick, V. Jacobson, \"RTP: A Transport Protocol for Real-Time Applications\", RFC 3550, Jul. 2003."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"crossref","unstructured":"E. Rescorla \"HTTP Over TLS\" RFC 2818 May 2000.   E. Rescorla \"HTTP Over TLS\" RFC 2818 May 2000.","DOI":"10.17487\/rfc2818"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"crossref","unstructured":"S. Lehtinen C. Lonvick \"The Secure Shell (SSH) Protocol Assigned Numbers\" RFC 4250 Jan. 2006.  S. Lehtinen C. Lonvick \"The Secure Shell (SSH) Protocol Assigned Numbers\" RFC 4250 Jan. 2006.","DOI":"10.17487\/rfc4250"}],"event":{"name":"SIGCOMM07: ACM SIGCOMM 2007 Conference","location":"Kyoto Japan","acronym":"SIGCOMM07","sponsor":["SIGCOMM ACM Special Interest Group on Data Communication","ACM Association for Computing Machinery"]},"container-title":["Proceedings of the 2007 conference on Applications, technologies, architectures, and protocols for computer communications"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1282380.1282386","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1282380.1282386","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T11:13:51Z","timestamp":1750245231000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1282380.1282386"}},"subtitle":["when randomness plays with you"],"short-title":[],"issued":{"date-parts":[[2007,8,27]]},"references-count":17,"alternative-id":["10.1145\/1282380.1282386","10.1145\/1282380"],"URL":"https:\/\/doi.org\/10.1145\/1282380.1282386","relation":{"is-identical-to":[{"id-type":"doi","id":"10.1145\/1282427.1282386","asserted-by":"object"}]},"subject":[],"published":{"date-parts":[[2007,8,27]]},"assertion":[{"value":"2007-08-27","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}