{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:28:05Z","timestamp":1750307285614,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":30,"publisher":"ACM","license":[{"start":{"date-parts":[[2010,8,2]],"date-time":"2010-08-02T00:00:00Z","timestamp":1280707200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2010,8,2]]},"DOI":"10.1145\/1941530.1941533","type":"proceedings-article","created":{"date-parts":[[2011,2,15]],"date-time":"2011-02-15T18:31:03Z","timestamp":1297794663000},"page":"12-21","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["Hidden VoIP calling records from networking intermediaries"],"prefix":"10.1145","author":[{"given":"Ge","family":"Zhang","sequence":"first","affiliation":[{"name":"Karlstad University, Karlstad, Sweden"}]},{"given":"Stefan","family":"Berthold","sequence":"additional","affiliation":[{"name":"Karlstad University, Karlstad, Sweden"}]}],"member":"320","published-online":{"date-parts":[[2010,8,2]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/358549.358563"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.5555\/829515.830555"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.5555\/371931.371983"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.5555\/1251375.1251396"},{"key":"e_1_3_2_1_5_1","first-page":"451","volume-title":"Kommunikation in Verteilten Systemen, Grundlagen, Anwendungen, Betrieb, GI\/ITG-Fachtagung","author":"Pfitzmann A.","year":"1991"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"crossref","unstructured":"J. Rosenberg H. Schulzrinne G. Camarillo A. Johnston J. Peterson R. Sparks M. Handley and E. Schooler. SIP: Session Initiation Protocol 2002. RFC 3261.  J. Rosenberg H. Schulzrinne G. Camarillo A. Johnston J. Peterson R. Sparks M. Handley and E. Schooler. SIP: Session Initiation Protocol 2002. RFC 3261.","DOI":"10.17487\/rfc3261"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"crossref","unstructured":"H. Schulzrinne S. Casner R. Frederick and V. Jacobson. RTP: A Transport Protocol for Real-Time Applications 2003. RFC 3550.  H. Schulzrinne S. Casner R. Frederick and V. Jacobson. RTP: A Transport Protocol for Real-Time Applications 2003. RFC 3550.","DOI":"10.17487\/rfc3550"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"crossref","unstructured":"K. Egevang and P. Francis. The IP Network Address Translator (NAT) 1994. RFC 1631.  K. Egevang and P. Francis. The IP Network Address Translator (NAT) 1994. RFC 1631.","DOI":"10.17487\/rfc1631"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"crossref","unstructured":"P. Srisuresh J. Kuthan J. Rosenberg A. Molitor and A. Rayhan. Middlebox communication architecture and framework 2002. RFC 3303.  P. Srisuresh J. Kuthan J. Rosenberg A. Molitor and A. Rayhan. Middlebox communication architecture and framework 2002. RFC 3303.","DOI":"10.17487\/rfc3303"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"crossref","unstructured":"J. Rosenberg R. Mahy and P. Matthews. Traversal using relays around nat (TURN): Relay extensions to session traversal utilities for NAT (STUN) 2010. RFC 5766.  J. Rosenberg R. Mahy and P. Matthews. Traversal using relays around nat (TURN): Relay extensions to session traversal utilities for NAT (STUN) 2010. RFC 5766.","DOI":"10.17487\/rfc6062"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","unstructured":"R. Zopf. Real-time Transport Protocol (RTP) Payload for Comfort Noise (CN) 2002. RFC 3389.  R. Zopf. Real-time Transport Protocol (RTP) Payload for Comfort Noise (CN) 2002. RFC 3389.","DOI":"10.17487\/rfc3389"},{"key":"e_1_3_2_1_12_1","unstructured":"G.711. http:\/\/www.itu.int\/rec\/T-REC-G.711\/e visited at 21th-Oct-2009.  G.711. http:\/\/www.itu.int\/rec\/T-REC-G.711\/e visited at 21th-Oct-2009."},{"key":"e_1_3_2_1_13_1","unstructured":"Speex. http:\/\/www.speex.org\/ visited at 21th-Oct-2009.  Speex. http:\/\/www.speex.org\/ visited at 21th-Oct-2009."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2006.1705881"},{"key":"e_1_3_2_1_15_1","unstructured":"A. Pfitzmann and M. Hansen. Anonymity unlinkability undetectability unobservability pseudonymity and identity management - a consolidated proposal for terminology. Technical report February 2008.  A. Pfitzmann and M. Hansen. Anonymity unlinkability undetectability unobservability pseudonymity and identity management - a consolidated proposal for terminology. Technical report February 2008."},{"key":"e_1_3_2_1_16_1","unstructured":"ITU-T. Recommendation G.114 - One-way Transmission Time 2003.  ITU-T. Recommendation G.114 - One-way Transmission Time 2003."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-27809-2_25"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-13241-4_13"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00778-007-0087-5"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2007.34"},{"key":"e_1_3_2_1_21_1","unstructured":"Council Resolution of 17 January 1995 on the lawful interception of telecommunications. http:\/\/eur-lex.europa.eu\/LexUriServ\/LexUriServ.do?uri=CELEX:31996G1104:EN:HTML visited at 21th-Jun-2010.  Council Resolution of 17 January 1995 on the lawful interception of telecommunications. http:\/\/eur-lex.europa.eu\/LexUriServ\/LexUriServ.do?uri=CELEX:31996G1104:EN:HTML visited at 21th-Jun-2010."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"crossref","unstructured":"J. Peterson. A Privacy Mechanism for the Session Initiation Protocol (SIP) 2002. RFC 3323.  J. Peterson. A Privacy Mechanism for the Session Initiation Protocol (SIP) 2002. RFC 3323.","DOI":"10.17487\/rfc3323"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2009.07.004"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1102120.1102133"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2006.72"},{"key":"e_1_3_2_1_26_1","first-page":"1","volume-title":"Proceedings of 16<sup>th<\/sup> USENIX Security Symposium on USENIX Security Symposium (SS '07)","author":"Wright C. V.","year":"2007"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2008.21"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2009.10.001"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"crossref","unstructured":"M. Munakata S. Schubert and T. Ohba. User-agent-driven privacy mechanism for SIP 2010. RFC 5767.  M. Munakata S. Schubert and T. Ohba. User-agent-driven privacy mechanism for SIP 2010. RFC 5767.","DOI":"10.17487\/rfc5767"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"crossref","unstructured":"J. Rosenberg. Obtaining and using globally routable user agent uris (GRUUs) in the session initiation protocol (SIP) 2009. RFC 5627.  J. Rosenberg. Obtaining and using globally routable user agent uris (GRUUs) in the session initiation protocol (SIP) 2009. RFC 5627.","DOI":"10.17487\/rfc5627"}],"event":{"name":"IPTComm '10: Principles, Systems and Applications of IP Telecommunications","sponsor":["Technische Universitat Munchen Technische Universitat Munchen","IFIP","SIGCOMM ACM Special Interest Group on Data Communication"],"location":"Munich Germany","acronym":"IPTComm '10"},"container-title":["Principles, Systems and Applications of IP Telecommunications"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1941530.1941533","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1941530.1941533","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T10:59:35Z","timestamp":1750244375000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1941530.1941533"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,8,2]]},"references-count":30,"alternative-id":["10.1145\/1941530.1941533","10.1145\/1941530"],"URL":"https:\/\/doi.org\/10.1145\/1941530.1941533","relation":{},"subject":[],"published":{"date-parts":[[2010,8,2]]},"assertion":[{"value":"2010-08-02","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}