|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 21 occurrences of 17 keywords
|
|
|
Results
Found 67 publication records. Showing 67 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
56 | Micah Sherr, Eric Cronin, Sandy Clark, Matt Blaze |
Signaling Vulnerabilities in Wiretapping Systems. |
IEEE Secur. Priv. |
2005 |
DBLP DOI BibTeX RDF |
CALEA, FISA, Title III, privacy, signal processing, wiretap, wiretapping |
56 | Susan Landau 0001 |
Security, Wiretapping, and the Internet. |
IEEE Secur. Priv. |
2005 |
DBLP DOI BibTeX RDF |
Communications Assistance for Law Enforcement Act (CALEA), security, VoIP, wiretapping |
48 | Shawn Lawson |
Subliminal wiretapping. |
Creativity & Cognition |
2009 |
DBLP DOI BibTeX RDF |
automatic writing, listen, mind-matter, ouija, psyleron, random event generator, subtle, interactive, random number generator, reg, wiretap, rng |
48 | Greg Goth |
Internet Wiretapping Decision Headed for the Courts. |
IEEE Internet Comput. |
2006 |
DBLP DOI BibTeX RDF |
CALEA, Communications Assistance for Law Enforcement Act, VoIP, voice-over-IP, FCC |
31 | Joseph J. Schwerha |
Cybercrime: Legal Standards Governing the Collection of Digital Evidence. |
Inf. Syst. Frontiers |
2004 |
DBLP DOI BibTeX RDF |
Fourth Amendment, Patriot Act, Title III, ECPA, wiretapping |
26 | Yuanyu Zhang, Zhumeng Zheng, Ji He, Shuangrui Zhao, Qianyue Qu, Yulong Shen, Xiaohong Jiang 0001 |
Opportunistic Wiretapping/Jamming: A New Attack Model in Millimeter-Wave Wireless Networks. |
IEEE Trans. Wirel. Commun. |
2023 |
DBLP DOI BibTeX RDF |
|
26 | Ilias Dimitriadis, Dimitrios Panteleimon Giakatos, Stelios Karamanidis, Pavlos Sermpezis, Kelly Kiki, Athena Vakali |
Analyzing large scale political discussions on Twitter: the use case of the Greek wiretapping scandal (#ypoklopes). |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
26 | Bin Qiu, Wenchi Cheng, Wei Zhang 0001 |
Robust Multi-Beam Secure mmWave Wireless Communication for Hybrid Wiretapping Systems. |
IEEE Trans. Inf. Forensics Secur. |
2023 |
DBLP DOI BibTeX RDF |
|
26 | Charles Robinson |
The Listeners: A History of Wiretapping in the United States - Bruce Hochman (Cambridge, MA, USA: Harvard Univ. Press, 2022, 366 pp.). |
IEEE Technol. Soc. Mag. |
2023 |
DBLP DOI BibTeX RDF |
|
26 | Daniel Spiekermann, Jörg Keller 0001 |
Wiretapping Pods and Nodes - Lawful Interception in Kubernetes. |
Electron. Commun. Eur. Assoc. Softw. Sci. Technol. |
2022 |
DBLP DOI BibTeX RDF |
|
26 | Yuanyu Zhang, Zhumeng Zheng, Ji He, Shuangrui Zhao, Qianyue Qu, Yulong Shen, Xiaohong Jiang |
Opportunistic Wiretapping/Jamming: A New Attack Model in Millimeter-Wave Wireless Networks. |
CoRR |
2022 |
DBLP DOI BibTeX RDF |
|
26 | Yael Mathov, Tal Ben Senior, Asaf Shabtai, Yuval Elovici |
Stop bugging me! Evading modern-day wiretapping using adversarial perturbations. |
Comput. Secur. |
2022 |
DBLP DOI BibTeX RDF |
|
26 | Truc Thanh Tran |
Network-Coding-based Jamming With Triple Transmission Time Slots: A Method To Secure Transmission In An Extreme Case of Source-Wiretapping and Unshared Jamming Signal. |
EAI Endorsed Trans. Ind. Networks Intell. Syst. |
2021 |
DBLP DOI BibTeX RDF |
|
26 | Yuanyu Zhang, Ji He, Qianyue Qu, Zhiwei Zhang |
Wiretapping or Jamming: On Eavesdropper Attacking Strategy in mmWave Ad Hoc Networks. |
NaNA |
2021 |
DBLP DOI BibTeX RDF |
|
26 | Tal Ben Senior, Yael Mathov, Asaf Shabtai, Yuval Elovici |
Stop Bugging Me! Evading Modern-Day Wiretapping Using Adversarial Perturbations. |
CoRR |
2020 |
DBLP BibTeX RDF |
|
26 | Yizhi Zhao, Hongmei Chi |
Secure polar coding with delayed wiretapping information. |
IET Commun. |
2020 |
DBLP DOI BibTeX RDF |
|
26 | Joseph Fitsanakis |
Redesigning Wiretapping - The Digitization of Communications Interception |
|
2020 |
DOI RDF |
|
26 | Satoshi Kosakatani, Tetsutaro Uehara, Songpon Teerakanok |
Japan's Act on Wiretapping for Criminal Investigation: How the system is implemented and how it should be. |
ICITST |
2020 |
DBLP DOI BibTeX RDF |
|
26 | Hui Chen 0008, Xiaofeng Tao, Na Li 0001, Yanzhao Hou, Jin Xu 0001, Zhu Han 0001 |
Secrecy Performance Analysis for Hybrid Wiretapping Systems Using Random Matrix Theory. |
IEEE Trans. Wirel. Commun. |
2019 |
DBLP DOI BibTeX RDF |
|
26 | Christoforos Ntantogian, Eleni Veroni, Georgios Karopoulos, Christos Xenakis |
A survey of voice and communication protection solutions against wiretapping. |
Comput. Electr. Eng. |
2019 |
DBLP DOI BibTeX RDF |
|
26 | Karl-Ludwig Besser, Pin-Hsun Lin, Carsten R. Janda, Eduard A. Jorswieck |
Machine Learning Assisted Wiretapping. |
ACSSC |
2018 |
DBLP DOI BibTeX RDF |
|
26 | Thomas Gabel, Philipp Klöppner, Eicke Godehardt, Alaa Tharwat |
Communication in Soccer Simulation: On the Use of Wiretapping Opponent Teams. |
RoboCup |
2018 |
DBLP DOI BibTeX RDF |
|
26 | Dominik Schürmann, Fabian Kabus, Gregor Hildermeier, Lars C. Wolf |
Wiretapping End-to-End Encrypted VoIP Calls: Real-World Attacks on ZRTP. |
Proc. Priv. Enhancing Technol. |
2017 |
DBLP DOI BibTeX RDF |
|
26 | Piotr Zawadzki |
Quantum Direct Communication Wiretapping. |
CN |
2017 |
DBLP DOI BibTeX RDF |
|
26 | Linda M. Merola |
Talking about NSA Wiretapping and Guantanamo: A Systematic Examination the Language used by Different Networks to Report Post-9/11 Policy Dilemmas Concerning Rights. |
Int. J. Signs Semiot. Syst. |
2016 |
DBLP DOI BibTeX RDF |
|
26 | Xiangmao Chang, Jin Wang 0009, Jianping Wang 0001, Kejie Lu, Yi Zhuang 0002 |
On the optimal design of secure network coding against wiretapping attack. |
Comput. Networks |
2016 |
DBLP DOI BibTeX RDF |
|
26 | Shu Wang, Xinyu Da, Zhenyong Chu |
Wiretapping Strategies for Artificial Noise Assisted Communication in MU-MIMO wiretap channel. |
KSII Trans. Internet Inf. Syst. |
2016 |
DBLP DOI BibTeX RDF |
|
26 | Jing Huang, Bo Xi, Peng Li, Fan Zhang 0010, Xinjie Zhao 0001 |
一种基于量子密码的卫星网络窃听攻击检测方法 (Method for Detecting Wiretapping Attack in Satellite Network Based on Quantum Cryptography). |
计算机科学 |
2016 |
DBLP DOI BibTeX RDF |
|
26 | Truc Thanh Tran, Hyung Yun Kong |
A method enabling exploitation of spatial diversity and physical layer security in an extreme case of source-wiretapping without a jamming beamformer. |
J. Commun. Networks |
2015 |
DBLP DOI BibTeX RDF |
|
26 | Sang Quang Nguyen 0001, Hyung Yun Kong |
Binary Jamming Message Solutions for Source-Wiretapping Under Physical-Layer Security: Analysis and Design. |
Wirel. Pers. Commun. |
2015 |
DBLP DOI BibTeX RDF |
|
26 | Mitch Monsour |
Surveillance or Security?: The Risks Posed by New Wiretapping Technologies, by Susan Landau. Cambridge, MA: MIT Press, 2013, 400 pp. $18.95 paper. ISBN 9780262518741 (paper). |
Inf. Soc. |
2015 |
DBLP DOI BibTeX RDF |
|
26 | Adam Bates 0001, Kevin R. B. Butler, Micah Sherr, Clay Shields, Patrick Traynor, Dan S. Wallach |
Accountable wiretapping - or - I know they can hear you now. |
J. Comput. Secur. |
2015 |
DBLP DOI BibTeX RDF |
|
26 | Maliheh Shirvanian, Nitesh Saxena |
Wiretapping via Mimicry: Short Voice Imitation Man-in-the-Middle Attacks on Crypto Phones. |
CCS |
2014 |
DBLP DOI BibTeX RDF |
|
26 | Chia-Hao Lee, Li-Chung Lo, Wan-Jen Huang |
Precoder design for AF cooperative systems with multiple wiretapping relays. |
ISCIT |
2014 |
DBLP DOI BibTeX RDF |
|
26 | Xiaoxin Lv, Baihai Zhang |
Security Analysis and Evaluation of Random Linear Network coding under Wiretapping Attack. |
J. Digit. Inf. Manag. |
2013 |
DBLP BibTeX RDF |
|
26 | Steven M. Bellovin, Matt Blaze, Sandy Clark, Susan Landau 0001 |
Going Bright: Wiretapping without Weakening Communications Infrastructure. |
IEEE Secur. Priv. |
2013 |
DBLP DOI BibTeX RDF |
|
26 | Andrew Clement |
IXmaps - Tracking your personal data through the NSA's warrantless wiretapping sites. |
ISTAS |
2013 |
DBLP DOI BibTeX RDF |
|
26 | Chang-Han Jong, Virgil D. Gligor |
Discovering records of private VoIP calls without wiretapping. |
AsiaCCS |
2012 |
DBLP DOI BibTeX RDF |
|
26 | Adam Bates 0001, Kevin R. B. Butler, Micah Sherr, Clay Shields, Patrick Traynor, Dan S. Wallach |
Accountable Wiretapping -or- I know they can hear you now. |
NDSS |
2012 |
DBLP BibTeX RDF |
|
26 | |
Wiretapping. |
Encyclopedia of Cryptography and Security (2nd Ed.) |
2011 |
DBLP DOI BibTeX RDF |
|
26 | Joffrey Villard, Pablo Piantanida, Shlomo Shamai |
Secure Lossy Source-Channel Wiretapping with Side Information at the Receiving Terminals |
CoRR |
2011 |
DBLP BibTeX RDF |
|
26 | Susan Landau 0001 |
Surveillance Or Security? The Risks Posed by New Wiretapping Technologies |
|
2011 |
RDF |
|
26 | Joffrey Villard, Pablo Piantanida, Shlomo Shamai |
Secure lossy source-channel wiretapping with side information at the receiving terminals. |
ISIT |
2011 |
DBLP DOI BibTeX RDF |
|
26 | Qin Guo, Mingxing Luo, Lixiang Li 0001, Yixian Yang |
Secure Network Coding against Wiretapping and Byzantine Attacks. |
EURASIP J. Wirel. Commun. Netw. |
2010 |
DBLP DOI BibTeX RDF |
|
26 | Arwen Mullikin, Syed M. Rahman |
Ethical Dilemma of Governmental Wiretapping |
CoRR |
2010 |
DBLP BibTeX RDF |
|
26 | Tao Cui, Tracey Ho, Jörg Kliewer |
On secure network coding with unequal link capacities and restricted wiretapping sets. |
ITW |
2010 |
DBLP DOI BibTeX RDF |
|
26 | Haris Aziz 0001, Oded Lachish, Mike Paterson, Rahul Savani |
Wiretapping a hidden network |
CoRR |
2009 |
DBLP BibTeX RDF |
|
26 | Josh Karlin, Stephanie Forrest, Jennifer Rexford |
Nation-State Routing: Censorship, Wiretapping, and BGP |
CoRR |
2009 |
DBLP BibTeX RDF |
|
26 | Haris Aziz 0001, Oded Lachish, Mike Paterson, Rahul Savani |
Wiretapping a Hidden Network. |
WINE |
2009 |
DBLP DOI BibTeX RDF |
|
26 | T. D. Wilson 0001 |
Review of: Diffie, Whitfield & Landau, S. Privacy on the line: the politics of wiretapping and encryption. Updated and expanded edition. Cambridge, MA: The MIT Press, 2007. |
Inf. Res. |
2008 |
DBLP BibTeX RDF |
|
26 | Whitfield Diffie, Susan Landau 0001 |
Privacy on the line: the politics of wiretapping and encryption. |
SIGACT News |
2008 |
DBLP DOI BibTeX RDF |
|
26 | Kim-Kwang Raymond Choo |
Privacy on the Line: The Politics of Wiretapping and Encryption, Updated and Expanded Edition. |
Comput. J. |
2008 |
DBLP DOI BibTeX RDF |
|
26 | Mohammad Ravanbakhsh, Mehdi M. Hassanzadeh, Dag Haugland |
Wiretapping Based on Node Corruption over Secure Network Coding: Analysis and Optimization. |
ICMCTA |
2008 |
DBLP DOI BibTeX RDF |
|
26 | Whitfield Diffie, Susan Landau 0001 |
Privacy on the line - the politics of wiretapping and encryption (updated expanded ed.). |
|
2007 |
RDF |
|
26 | Kamal Jain |
Security based on network topology against the wiretapping attack. |
IEEE Wirel. Commun. |
2004 |
DBLP DOI BibTeX RDF |
|
26 | Internet Architecture Board, Internet Engineering Steering Group |
IETF Policy on Wiretapping. |
RFC |
2000 |
DBLP DOI BibTeX RDF |
|
26 | Thomas A. Peters |
Privacy on the Line: The Politics of Wiretapping and Encryption, by Whitfield Diffie and Susan Landau. |
J. Am. Soc. Inf. Sci. |
1998 |
DBLP DOI BibTeX RDF |
|
26 | Marc Rotenberg |
Wiretapping Bill: Costly and Intrusive. |
Computerization and Controversy, 2nd Ed. |
1996 |
DBLP DOI BibTeX RDF |
|
26 | David Kahn |
A Soviet Wiretapping Office. |
Cryptologia |
1989 |
DBLP DOI BibTeX RDF |
|
23 | Steven M. Bellovin, Matt Blaze, Whitfield Diffie, Susan Landau 0001, Peter G. Neumann, Jennifer Rexford |
Risking Communications Security: Potential Hazards of the Protect America Act. |
IEEE Secur. Priv. |
2008 |
DBLP DOI BibTeX RDF |
|
23 | Lijuan Geng, Feng Lu, Ying-Chang Liang, Francois P. S. Chin |
Secure multi-path construction in wireless sensor networks using network coding. |
PIMRC |
2008 |
DBLP DOI BibTeX RDF |
|
23 | Klara A. Weiand, Jos S. Bouten, Cor J. Veenman |
Similarity Visualization for the Grouping of Forensic Speech Recordings. |
IWCF |
2008 |
DBLP DOI BibTeX RDF |
|
23 | Albert Gidari |
Designing the right wiretap solution: setting standards under CALEA. |
IEEE Secur. Priv. |
2006 |
DBLP DOI BibTeX RDF |
|
23 | Shiping Chen 0003, Xinyuan Wang 0005, Sushil Jajodia |
On the anonymity and traceability of peer-to-peer VoIP calls. |
IEEE Netw. |
2006 |
DBLP DOI BibTeX RDF |
|
23 | Francesco Palmieri 0002, Ugo Fiore |
Securing the MPLS Control Plane. |
HPCC |
2005 |
DBLP DOI BibTeX RDF |
strong authentication, label distribution, integrity, MPLS, signaling |
23 | Robert Tracz, Konrad S. Wrona |
Fair electronic cash withdrawal and change return for wireless networks. |
Workshop Mobile Commerce |
2001 |
DBLP DOI BibTeX RDF |
electronic commerce, payment systems, wireless applications |
23 | Mohammed Inam Ul Haq |
Insuring individual's privacy from statistical data base users. |
AFIPS National Computer Conference |
1975 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #67 of 67 (100 per page; Change: )
|
|