{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T17:31:01Z","timestamp":1725471061628},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540377504"},{"type":"electronic","value":"9783540377528"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11824633_24","type":"book-chapter","created":{"date-parts":[[2006,9,18]],"date-time":"2006-09-18T11:23:09Z","timestamp":1158578589000},"page":"233-242","source":"Crossref","is-referenced-by-count":0,"title":["Information Leakage in Ubiquitous Voice-over-IP Communications"],"prefix":"10.1007","author":[{"given":"Thorsten","family":"Neumann","sequence":"first","affiliation":[]},{"given":"Heiko","family":"Tillwick","sequence":"additional","affiliation":[]},{"given":"Martin S.","family":"Olivier","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"6","key":"24_CR1","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1145\/1028893.1028895","volume":"2","author":"P. Sherburne","year":"2004","unstructured":"Sherburne, P., Fitzgerald, C.: You Don\u2019t Know Jack About VoIP. Queue\u00a02(6), 30\u201338 (2004)","journal-title":"Queue"},{"key":"24_CR2","doi-asserted-by":"crossref","first-page":"94","DOI":"10.1038\/scientificamerican0991-94","volume":"3","author":"M. Weiser","year":"1991","unstructured":"Weiser, M.: The Computer for the 21st Century. Scientific American Ubicomp.\u00a03, 94\u2013104 (1991)","journal-title":"Scientific American Ubicomp."},{"key":"24_CR3","unstructured":"Peterson, J., Jennings, C.: Enhancements for Authenticated Identity Management in the Session Initiation Protocol (SIP), RFC 3323 (2003)"},{"key":"24_CR4","doi-asserted-by":"crossref","unstructured":"Rosenberg, J., Schulzrinne, H., Camarillo, G., Johnston, A., Peterson, J., Sparks, R., Handley, M., Schooler, E.: SIP: Session Initiation Protocol, RFC 3261 (2002)","DOI":"10.17487\/rfc3261"},{"key":"24_CR5","doi-asserted-by":"crossref","unstructured":"Peterson, J.: A Privacy Mechanism for the Session Initiation Protocol (SIP), RFC 3323 (2002)","DOI":"10.17487\/rfc3323"},{"issue":"1","key":"24_CR6","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1145\/502269.502271","volume":"45","author":"U. Varshney","year":"2002","unstructured":"Varshney, U., Snow, A., McGivern, M., Howard, C.: Voice over IP. Commun. ACM\u00a045(1), 89\u201396 (2002)","journal-title":"Commun. ACM"},{"key":"24_CR7","first-page":"134","volume-title":"The Session Initiation Protocol: Internet-centric signaling","author":"H. Schulzrinne","year":"2000","unstructured":"Schulzrinne, H., Rosenberg, J.: The Session Initiation Protocol: Internet-centric signaling, vol.\u00a038, pp. 134\u2013141. IEEE, Los Alamitos (2000)"},{"key":"24_CR8","unstructured":"Zugenmaier, A., Kreuzer, M., M\u00fcller, G.: The freiburg privacy diamond: An attacker model for a mobile computing environment. In: KiVS Kurzbeitr\u00e4ge, pp. 131\u2013141 (2003)"},{"key":"24_CR9","unstructured":"Fraley, D.L.: Voice Over IP Communications Must Be Secured. Gartner, Inc. (G00124016) 5 of 6 (2004)"},{"key":"24_CR10","unstructured":"Faltstrom, P.: E.164 number and DNS. RFC 2916 (1998)"},{"key":"24_CR11","doi-asserted-by":"publisher","first-page":"201","DOI":"10.1145\/358916.358991","volume-title":"CSCW 2000: Proceedings of the 2000 ACM Conference on Computer Supported Cooperative Work","author":"L. Palen","year":"2000","unstructured":"Palen, L., Salzman, M., Youngs, E.: Going wireless: behavior & practice of new mobile phone users. In: CSCW 2000: Proceedings of the 2000 ACM Conference on Computer Supported Cooperative Work, USA, pp. 201\u2013210. ACM Press, New York (2000)"},{"key":"24_CR12","doi-asserted-by":"publisher","first-page":"210","DOI":"10.1145\/143457.143481","volume-title":"CSCW 1992: Proceedings of the 1992 ACM Conference on Computer-Supported Cooperative Work","author":"D. Hindus","year":"1992","unstructured":"Hindus, D., Schmandt, C.: Ubiquitous audio: capturing spontaneous collaboration. In: CSCW 1992: Proceedings of the 1992 ACM Conference on Computer-Supported Cooperative Work, pp. 210\u2013217. ACM Press, New York (1992)"},{"key":"24_CR13","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1145\/587078.587081","volume-title":"CSCW 2002: Proceedings of the 2002 ACM Conference on Computer Supported Cooperative Work","author":"E. Isaacs","year":"2002","unstructured":"Isaacs, E., Walendowski, A., Whittaker, S., Schiano, D.J., Kamm, C.: The character, functions, and styles of instant messaging in the workplace. In: CSCW 2002: Proceedings of the 2002 ACM Conference on Computer Supported Cooperative Work, pp. 11\u201320. ACM Press, New York (2002)"},{"key":"24_CR14","unstructured":"Zugenmaier, A.: The Freiburg Privacy Diamond - A Conceptual Model for Mobility in Anonymity Systems. In: Proceedings of Globecom 2003. (2003)"},{"issue":"4","key":"24_CR15","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1109\/MSP.2005.92","volume":"3","author":"B. Alfonsi","year":"2005","unstructured":"Alfonsi, B.: Alliance addresses VoIP security. IEEE Security & Privacy\u00a03(4), 8 (2005)","journal-title":"IEEE Security & Privacy"},{"key":"24_CR16","unstructured":"Neumann, T., Olivier, M.S.: Enhancements to SIP to prevent abuse of Voice-over-IP services. In: Proceedings of Southern African Telecommunication Networks and Applications Conference (SATNAC) (2005)"}],"container-title":["Lecture Notes in Computer Science","Trust and Privacy in Digital Business"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11824633_24.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T15:17:37Z","timestamp":1605626257000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11824633_24"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540377504","9783540377528"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/11824633_24","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}