{"id":"https://openalex.org/W2073050280","doi":"https://doi.org/10.1145/1143549.1143590","title":"Anti-vamming trust enforcement in peer-to-peer VoIP networks","display_name":"Anti-vamming trust enforcement in peer-to-peer VoIP networks","publication_year":2006,"publication_date":"2006-07-03","ids":{"openalex":"https://openalex.org/W2073050280","doi":"https://doi.org/10.1145/1143549.1143590","mag":"2073050280"},"language":"en","primary_location":{"id":"doi:10.1145/1143549.1143590","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1143549.1143590","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2006 international conference on Wireless communications and mobile computing","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5104017029","display_name":"Nilanjan Banerjee","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Nilanjan Banerjee","raw_affiliation_strings":["Motorola India Research Labs, Bangalore, India"],"affiliations":[{"raw_affiliation_string":"Motorola India Research Labs, Bangalore, India","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5089376981","display_name":"Samir Saklikar","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Samir Saklikar","raw_affiliation_strings":["Motorola India Research Labs, Bangalore, India"],"affiliations":[{"raw_affiliation_string":"Motorola India Research Labs, Bangalore, India","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5037739037","display_name":"Subir Kumar Saha","orcid":"https://orcid.org/0000-0002-3681-8061"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Subir Saha","raw_affiliation_strings":["Motorola India Research Labs, Bangalore, India"],"affiliations":[{"raw_affiliation_string":"Motorola India Research Labs, Bangalore, India","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5104017029"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":1.1283,"has_fulltext":false,"cited_by_count":11,"citation_normalized_percentile":{"value":0.79306801,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"201","last_page":"206"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10651","display_name":"IPv6, Mobility, Handover, Networks, Security","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10651","display_name":"IPv6, Mobility, Handover, Networks, Security","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9980000257492065,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/voice-over-ip","display_name":"Voice over IP","score":0.9100954532623291},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7940837144851685},{"id":"https://openalex.org/keywords/enforcement","display_name":"Enforcement","score":0.6365424394607544},{"id":"https://openalex.org/keywords/popularity","display_name":"Popularity","score":0.6084924936294556},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6028265357017517},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5186228156089783},{"id":"https://openalex.org/keywords/peer-to-peer","display_name":"Peer-to-peer","score":0.47545143961906433},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.4279693365097046},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.40029141306877136},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.1670110523700714}],"concepts":[{"id":"https://openalex.org/C171246234","wikidata":"https://www.wikidata.org/wiki/Q81945","display_name":"Voice over IP","level":3,"score":0.9100954532623291},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7940837144851685},{"id":"https://openalex.org/C2779777834","wikidata":"https://www.wikidata.org/wiki/Q4202277","display_name":"Enforcement","level":2,"score":0.6365424394607544},{"id":"https://openalex.org/C2780586970","wikidata":"https://www.wikidata.org/wiki/Q1357284","display_name":"Popularity","level":2,"score":0.6084924936294556},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6028265357017517},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5186228156089783},{"id":"https://openalex.org/C534932454","wikidata":"https://www.wikidata.org/wiki/Q161410","display_name":"Peer-to-peer","level":2,"score":0.47545143961906433},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.4279693365097046},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.40029141306877136},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.1670110523700714},{"id":"https://openalex.org/C77805123","wikidata":"https://www.wikidata.org/wiki/Q161272","display_name":"Social psychology","level":1,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/1143549.1143590","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1143549.1143590","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2006 international conference on Wireless communications and mobile computing","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","score":0.4099999964237213,"id":"https://metadata.un.org/sdg/9"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":12,"referenced_works":["https://openalex.org/W315107650","https://openalex.org/W1601379374","https://openalex.org/W1998350371","https://openalex.org/W2052987781","https://openalex.org/W2097725665","https://openalex.org/W2114429401","https://openalex.org/W2150010995","https://openalex.org/W2170655411","https://openalex.org/W2732959252","https://openalex.org/W2987031481","https://openalex.org/W6635765730","https://openalex.org/W6674817225"],"related_works":["https://openalex.org/W2368605798","https://openalex.org/W2518037665","https://openalex.org/W2348524959","https://openalex.org/W2477036161","https://openalex.org/W2368049389","https://openalex.org/W2384861574","https://openalex.org/W4294565801","https://openalex.org/W2170801710","https://openalex.org/W2952704802","https://openalex.org/W2741781807"],"abstract_inverted_index":{"With":[0],"the":[1,9,21,29,32,37,44,117],"increasing":[2],"popularity":[3],"of":[4,11,28,31,90,106],"Voice":[5],"over":[6,20],"IP":[7],"(VoIP)":[8],"threat":[10,25],"vamming":[12],"or":[13,140],"VoIP":[14,119,135],"spam":[15],"calls":[16],"is":[17,85],"looming":[18],"large":[19],"telecom":[22],"industry.":[23],"This":[24],"arises":[26],"out":[27],"openness":[30],"IP-based":[33],"network":[34,45],"such":[35],"as":[36],"Internet,":[38],"which":[39],"enables":[40],"anyone":[41],"to":[42,62,75,81,86,116],"join":[43],"without":[46],"proving":[47],"reasonable":[48],"trustworthiness.":[49],"Although":[50],"this":[51,77,97,123],"problem":[52],"could":[53,137],"be":[54,63,138],"solved":[55],"satisfactorily":[56],"in":[57,66],"managed":[58],"networks,":[59],"it":[60],"proves":[61],"a":[64,82,101,130,133,144],"nightmare":[65],"distributed,":[67],"unmanaged":[68],"peer-to-peer":[69],"(p2p)":[70],"networks.":[71],"A":[72],"possible":[73],"approach":[74],"solve":[76],"problem,":[78],"at":[79],"least":[80],"certain":[83],"extent,":[84],"associate":[87,113],"some":[88],"level":[89],"trust":[91,102,114],"with":[92],"each":[93],"p2p":[94,118,134],"entity.":[95],"In":[96],"paper,":[98],"we":[99],"propose":[100],"enforcement":[103],"framework":[104],"consisting":[105],"computation":[107],"and":[108],"memory":[109],"bound":[110],"functions":[111],"that":[112],"implicitly":[115],"entities.":[120],"Based":[121],"on":[122],"trust,":[124],"one":[125],"can":[126],"judiciously":[127],"decide":[128],"whether":[129],"call":[131],"from":[132],"entity":[136],"accepted":[139],"not,":[141],"thus":[142],"implementing":[143],"preliminary":[145],"screening":[146],"mechanism":[147],"for":[148],"malicious":[149],"callers.":[150]},"counts_by_year":[{"year":2018,"cited_by_count":2},{"year":2016,"cited_by_count":2},{"year":2013,"cited_by_count":1},{"year":2012,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
