{"id":"https://openalex.org/W2043681328","doi":"https://doi.org/10.1145/1102120.1102133","title":"Tracking anonymous peer-to-peer VoIP calls on the internet","display_name":"Tracking anonymous peer-to-peer VoIP calls on the internet","publication_year":2005,"publication_date":"2005-11-07","ids":{"openalex":"https://openalex.org/W2043681328","doi":"https://doi.org/10.1145/1102120.1102133","mag":"2043681328"},"language":"en","primary_location":{"id":"doi:10.1145/1102120.1102133","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1102120.1102133","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 12th ACM conference on Computer and communications security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100634221","display_name":"Xinyuan Wang","orcid":"https://orcid.org/0009-0006-8330-342X"},"institutions":[{"id":"https://openalex.org/I162714631","display_name":"George Mason University","ror":"https://ror.org/02jqj7156","country_code":"US","type":"education","lineage":["https://openalex.org/I162714631"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Xinyuan Wang","raw_affiliation_strings":["George Mason University, Fairfax, VA"],"affiliations":[{"raw_affiliation_string":"George Mason University, Fairfax, VA","institution_ids":["https://openalex.org/I162714631"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5043470959","display_name":"Shiping Chen","orcid":"https://orcid.org/0000-0002-4603-0024"},"institutions":[{"id":"https://openalex.org/I162714631","display_name":"George Mason University","ror":"https://ror.org/02jqj7156","country_code":"US","type":"education","lineage":["https://openalex.org/I162714631"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Shiping Chen","raw_affiliation_strings":["George Mason University, Fairfax, VA"],"affiliations":[{"raw_affiliation_string":"George Mason University, Fairfax, VA","institution_ids":["https://openalex.org/I162714631"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5010727123","display_name":"Sushil Jajodia","orcid":"https://orcid.org/0000-0003-3210-558X"},"institutions":[{"id":"https://openalex.org/I162714631","display_name":"George Mason University","ror":"https://ror.org/02jqj7156","country_code":"US","type":"education","lineage":["https://openalex.org/I162714631"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Sushil Jajodia","raw_affiliation_strings":["George Mason University, Fairfax, VA"],"affiliations":[{"raw_affiliation_string":"George Mason University, Fairfax, VA","institution_ids":["https://openalex.org/I162714631"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5100634221"],"corresponding_institution_ids":["https://openalex.org/I162714631"],"apc_list":null,"apc_paid":null,"fwci":23.2914,"has_fulltext":false,"cited_by_count":232,"citation_normalized_percentile":{"value":0.99499013,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":100},"biblio":{"volume":null,"issue":null,"first_page":"81","last_page":"91"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9897000193595886,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9864000082015991,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/voice-over-ip","display_name":"Voice over IP","score":0.9530110359191895},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.796705961227417},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.7076539397239685},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.6592907905578613},{"id":"https://openalex.org/keywords/latency","display_name":"Latency (audio)","score":0.6542932987213135},{"id":"https://openalex.org/keywords/peer-to-peer","display_name":"Peer-to-peer","score":0.6334177851676941},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.6277221441268921},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.557197630405426},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5311340689659119},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.1887706220149994},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.11644068360328674}],"concepts":[{"id":"https://openalex.org/C171246234","wikidata":"https://www.wikidata.org/wiki/Q81945","display_name":"Voice over IP","level":3,"score":0.9530110359191895},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.796705961227417},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.7076539397239685},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.6592907905578613},{"id":"https://openalex.org/C82876162","wikidata":"https://www.wikidata.org/wiki/Q17096504","display_name":"Latency (audio)","level":2,"score":0.6542932987213135},{"id":"https://openalex.org/C534932454","wikidata":"https://www.wikidata.org/wiki/Q161410","display_name":"Peer-to-peer","level":2,"score":0.6334177851676941},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.6277221441268921},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.557197630405426},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5311340689659119},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.1887706220149994},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.11644068360328674}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/1102120.1102133","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1102120.1102133","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 12th ACM conference on Computer and communications security","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":33,"referenced_works":["https://openalex.org/W24626785","https://openalex.org/W127688506","https://openalex.org/W616265588","https://openalex.org/W1490171656","https://openalex.org/W1506219363","https://openalex.org/W1541939527","https://openalex.org/W1550624107","https://openalex.org/W1579427489","https://openalex.org/W1591180318","https://openalex.org/W1655958391","https://openalex.org/W1869319442","https://openalex.org/W1967949770","https://openalex.org/W2040210405","https://openalex.org/W2102351657","https://openalex.org/W2111597645","https://openalex.org/W2119030343","https://openalex.org/W2127133592","https://openalex.org/W2127295197","https://openalex.org/W2128945468","https://openalex.org/W2132957552","https://openalex.org/W2139978474","https://openalex.org/W2143629476","https://openalex.org/W2163674653","https://openalex.org/W2341111334","https://openalex.org/W2913620932","https://openalex.org/W2914982603","https://openalex.org/W4250493029","https://openalex.org/W4285719527","https://openalex.org/W6605166902","https://openalex.org/W6629109040","https://openalex.org/W6633238283","https://openalex.org/W6637080381","https://openalex.org/W6807916273"],"related_works":["https://openalex.org/W2084179496","https://openalex.org/W2103238357","https://openalex.org/W2741704743","https://openalex.org/W2262810789","https://openalex.org/W4386040921","https://openalex.org/W2914904360","https://openalex.org/W2749819919","https://openalex.org/W2993764333","https://openalex.org/W2977917096","https://openalex.org/W2167843315"],"abstract_inverted_index":{"Peer-to-peer":[0],"VoIP":[1,61,94,118,154,171],"calls":[2,17,62,172],"are":[3,18,32,66,143,184],"becoming":[4],"increasingly":[5],"popular":[6],"due":[7],"to":[8,22,37,78,86,115,186],"their":[9],"advantages":[10],"in":[11,76],"cost":[12],"and":[13,24,41,57,122,156,178],"convenience.":[14],"When":[15],"these":[16],"encrypted":[19,93],"from":[20],"end":[21,23],"anonymized":[25,67],"by":[26,34,68,96,146],"low":[27,69,131,180],"latency":[28,70,132,181],"anonymizing":[29,71,133,161,182],"network,":[30],"they":[31,65],"considered":[33],"many":[35,79],"people":[36],"be":[38,52,127],"both":[39],"secure":[40],"anonymous.In":[42],"this":[43],"paper,":[44],"we":[45],"present":[46],"a":[47,88,158],"watermark":[48,90,125],"technique":[49],"that":[50,107,166],"could":[51,126],"used":[53],"for":[54],"effectively":[55],"identifying":[56],"correlating":[58],"encrypted,":[59],"peer-to-peer":[60,153,170],"even":[63],"if":[64,135],"networks.":[72],"This":[73],"result":[74],"is":[75,85,138,176],"contrast":[77],"people's":[80],"perception.":[81],"The":[82],"key":[83],"idea":[84],"embed":[87],"unique":[89,121],"into":[91],"the":[92,99,123,130,147,174],"flow":[95],"slightly":[97],"adjusting":[98],"timing":[100,187],"of":[101],"selected":[102],"packets.":[103],"Our":[104,140,163],"analysis":[105],"shows":[106],"it":[108],"only":[109],"takes":[110],"several":[111],"milliseconds":[112],"time":[113],"adjustment":[114],"make":[116],"normal":[117],"flows":[119],"highly":[120],"embedded":[124],"preserved":[128],"across":[129],"network":[134],"appropriate":[136],"redundancy":[137],"applied.":[139],"analytical":[141],"results":[142,164],"backed":[144],"up":[145],"real-time":[148],"experiments":[149],"performed":[150],"on":[151,157,173],"leading":[152],"client":[155],"commercially":[159],"deployed":[160],"network.":[162],"demonstrate":[165],"(1)":[167],"tracking":[168],"anonymous":[169],"Internet":[175],"feasible":[177],"(2)":[179],"networks":[183],"susceptible":[185],"attacks.":[188]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":3},{"year":2021,"cited_by_count":4},{"year":2020,"cited_by_count":6},{"year":2019,"cited_by_count":9},{"year":2018,"cited_by_count":6},{"year":2017,"cited_by_count":12},{"year":2016,"cited_by_count":7},{"year":2015,"cited_by_count":6},{"year":2014,"cited_by_count":12},{"year":2013,"cited_by_count":28},{"year":2012,"cited_by_count":23}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
