Privacy of encrypted Voice Over Internet Protocol

In this research, we present a investigative study on how timing-based traffic analysis attacks can be used for recovery of the speech from a Voice Over Internet Protocol (VOIP) conversation by taking advantage of the reduction or suppression of the generation of traffic whenever the sender detects...

Full description

Bibliographic Details
Main Author: Lella, Tuneesh Kumar
Other Authors: BETTATI, RICCARDO
Format: Others
Language:en_US
Published: Texas A&M University 2008
Subjects:
HMM
Online Access:http://hdl.handle.net/1969.1/86009