Privacy of encrypted Voice Over Internet Protocol
In this research, we present a investigative study on how timing-based traffic analysis attacks can be used for recovery of the speech from a Voice Over Internet Protocol (VOIP) conversation by taking advantage of the reduction or suppression of the generation of traffic whenever the sender detects...
Main Author: | |
---|---|
Other Authors: | |
Format: | Others |
Language: | en_US |
Published: |
Texas A&M University
2008
|
Subjects: | |
Online Access: | http://hdl.handle.net/1969.1/86009 |