The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for wiretapping with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1975-2007 (15) 2008-2011 (18) 2012-2016 (15) 2017-2022 (15) 2023 (4)
Publication types (Num. hits)
article(42) book(3) incollection(2) inproceedings(20)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 21 occurrences of 17 keywords

Results
Found 67 publication records. Showing 67 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
56Micah Sherr, Eric Cronin, Sandy Clark, Matt Blaze Signaling Vulnerabilities in Wiretapping Systems. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF CALEA, FISA, Title III, privacy, signal processing, wiretap, wiretapping
56Susan Landau 0001 Security, Wiretapping, and the Internet. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Communications Assistance for Law Enforcement Act (CALEA), security, VoIP, wiretapping
48Shawn Lawson Subliminal wiretapping. Search on Bibsonomy Creativity & Cognition The full citation details ... 2009 DBLP  DOI  BibTeX  RDF automatic writing, listen, mind-matter, ouija, psyleron, random event generator, subtle, interactive, random number generator, reg, wiretap, rng
48Greg Goth Internet Wiretapping Decision Headed for the Courts. Search on Bibsonomy IEEE Internet Comput. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF CALEA, Communications Assistance for Law Enforcement Act, VoIP, voice-over-IP, FCC
31Joseph J. Schwerha Cybercrime: Legal Standards Governing the Collection of Digital Evidence. Search on Bibsonomy Inf. Syst. Frontiers The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Fourth Amendment, Patriot Act, Title III, ECPA, wiretapping
26Yuanyu Zhang, Zhumeng Zheng, Ji He, Shuangrui Zhao, Qianyue Qu, Yulong Shen, Xiaohong Jiang 0001 Opportunistic Wiretapping/Jamming: A New Attack Model in Millimeter-Wave Wireless Networks. Search on Bibsonomy IEEE Trans. Wirel. Commun. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
26Ilias Dimitriadis, Dimitrios Panteleimon Giakatos, Stelios Karamanidis, Pavlos Sermpezis, Kelly Kiki, Athena Vakali Analyzing large scale political discussions on Twitter: the use case of the Greek wiretapping scandal (#ypoklopes). Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
26Bin Qiu, Wenchi Cheng, Wei Zhang 0001 Robust Multi-Beam Secure mmWave Wireless Communication for Hybrid Wiretapping Systems. Search on Bibsonomy IEEE Trans. Inf. Forensics Secur. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
26Charles Robinson The Listeners: A History of Wiretapping in the United States - Bruce Hochman (Cambridge, MA, USA: Harvard Univ. Press, 2022, 366 pp.). Search on Bibsonomy IEEE Technol. Soc. Mag. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
26Daniel Spiekermann, Jörg Keller 0001 Wiretapping Pods and Nodes - Lawful Interception in Kubernetes. Search on Bibsonomy Electron. Commun. Eur. Assoc. Softw. Sci. Technol. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
26Yuanyu Zhang, Zhumeng Zheng, Ji He, Shuangrui Zhao, Qianyue Qu, Yulong Shen, Xiaohong Jiang Opportunistic Wiretapping/Jamming: A New Attack Model in Millimeter-Wave Wireless Networks. Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
26Yael Mathov, Tal Ben Senior, Asaf Shabtai, Yuval Elovici Stop bugging me! Evading modern-day wiretapping using adversarial perturbations. Search on Bibsonomy Comput. Secur. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
26Truc Thanh Tran Network-Coding-based Jamming With Triple Transmission Time Slots: A Method To Secure Transmission In An Extreme Case of Source-Wiretapping and Unshared Jamming Signal. Search on Bibsonomy EAI Endorsed Trans. Ind. Networks Intell. Syst. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
26Yuanyu Zhang, Ji He, Qianyue Qu, Zhiwei Zhang Wiretapping or Jamming: On Eavesdropper Attacking Strategy in mmWave Ad Hoc Networks. Search on Bibsonomy NaNA The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
26Tal Ben Senior, Yael Mathov, Asaf Shabtai, Yuval Elovici Stop Bugging Me! Evading Modern-Day Wiretapping Using Adversarial Perturbations. Search on Bibsonomy CoRR The full citation details ... 2020 DBLP  BibTeX  RDF
26Yizhi Zhao, Hongmei Chi Secure polar coding with delayed wiretapping information. Search on Bibsonomy IET Commun. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
26Joseph Fitsanakis Redesigning Wiretapping - The Digitization of Communications Interception Search on Bibsonomy 2020   DOI  RDF
26Satoshi Kosakatani, Tetsutaro Uehara, Songpon Teerakanok Japan's Act on Wiretapping for Criminal Investigation: How the system is implemented and how it should be. Search on Bibsonomy ICITST The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
26Hui Chen 0008, Xiaofeng Tao, Na Li 0001, Yanzhao Hou, Jin Xu 0001, Zhu Han 0001 Secrecy Performance Analysis for Hybrid Wiretapping Systems Using Random Matrix Theory. Search on Bibsonomy IEEE Trans. Wirel. Commun. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
26Christoforos Ntantogian, Eleni Veroni, Georgios Karopoulos, Christos Xenakis A survey of voice and communication protection solutions against wiretapping. Search on Bibsonomy Comput. Electr. Eng. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
26Karl-Ludwig Besser, Pin-Hsun Lin, Carsten R. Janda, Eduard A. Jorswieck Machine Learning Assisted Wiretapping. Search on Bibsonomy ACSSC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
26Thomas Gabel, Philipp Klöppner, Eicke Godehardt, Alaa Tharwat Communication in Soccer Simulation: On the Use of Wiretapping Opponent Teams. Search on Bibsonomy RoboCup The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
26Dominik Schürmann, Fabian Kabus, Gregor Hildermeier, Lars C. Wolf Wiretapping End-to-End Encrypted VoIP Calls: Real-World Attacks on ZRTP. Search on Bibsonomy Proc. Priv. Enhancing Technol. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
26Piotr Zawadzki Quantum Direct Communication Wiretapping. Search on Bibsonomy CN The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
26Linda M. Merola Talking about NSA Wiretapping and Guantanamo: A Systematic Examination the Language used by Different Networks to Report Post-9/11 Policy Dilemmas Concerning Rights. Search on Bibsonomy Int. J. Signs Semiot. Syst. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
26Xiangmao Chang, Jin Wang 0009, Jianping Wang 0001, Kejie Lu, Yi Zhuang 0002 On the optimal design of secure network coding against wiretapping attack. Search on Bibsonomy Comput. Networks The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
26Shu Wang, Xinyu Da, Zhenyong Chu Wiretapping Strategies for Artificial Noise Assisted Communication in MU-MIMO wiretap channel. Search on Bibsonomy KSII Trans. Internet Inf. Syst. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
26Jing Huang, Bo Xi, Peng Li, Fan Zhang 0010, Xinjie Zhao 0001 一种基于量子密码的卫星网络窃听攻击检测方法 (Method for Detecting Wiretapping Attack in Satellite Network Based on Quantum Cryptography). Search on Bibsonomy 计算机科学 The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
26Truc Thanh Tran, Hyung Yun Kong A method enabling exploitation of spatial diversity and physical layer security in an extreme case of source-wiretapping without a jamming beamformer. Search on Bibsonomy J. Commun. Networks The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
26Sang Quang Nguyen 0001, Hyung Yun Kong Binary Jamming Message Solutions for Source-Wiretapping Under Physical-Layer Security: Analysis and Design. Search on Bibsonomy Wirel. Pers. Commun. The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
26Mitch Monsour Surveillance or Security?: The Risks Posed by New Wiretapping Technologies, by Susan Landau. Cambridge, MA: MIT Press, 2013, 400 pp. $18.95 paper. ISBN 9780262518741 (paper). Search on Bibsonomy Inf. Soc. The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
26Adam Bates 0001, Kevin R. B. Butler, Micah Sherr, Clay Shields, Patrick Traynor, Dan S. Wallach Accountable wiretapping - or - I know they can hear you now. Search on Bibsonomy J. Comput. Secur. The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
26Maliheh Shirvanian, Nitesh Saxena Wiretapping via Mimicry: Short Voice Imitation Man-in-the-Middle Attacks on Crypto Phones. Search on Bibsonomy CCS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
26Chia-Hao Lee, Li-Chung Lo, Wan-Jen Huang Precoder design for AF cooperative systems with multiple wiretapping relays. Search on Bibsonomy ISCIT The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
26Xiaoxin Lv, Baihai Zhang Security Analysis and Evaluation of Random Linear Network coding under Wiretapping Attack. Search on Bibsonomy J. Digit. Inf. Manag. The full citation details ... 2013 DBLP  BibTeX  RDF
26Steven M. Bellovin, Matt Blaze, Sandy Clark, Susan Landau 0001 Going Bright: Wiretapping without Weakening Communications Infrastructure. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
26Andrew Clement IXmaps - Tracking your personal data through the NSA's warrantless wiretapping sites. Search on Bibsonomy ISTAS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
26Chang-Han Jong, Virgil D. Gligor Discovering records of private VoIP calls without wiretapping. Search on Bibsonomy AsiaCCS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
26Adam Bates 0001, Kevin R. B. Butler, Micah Sherr, Clay Shields, Patrick Traynor, Dan S. Wallach Accountable Wiretapping -or- I know they can hear you now. Search on Bibsonomy NDSS The full citation details ... 2012 DBLP  BibTeX  RDF
26 Wiretapping. Search on Bibsonomy Encyclopedia of Cryptography and Security (2nd Ed.) The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
26Joffrey Villard, Pablo Piantanida, Shlomo Shamai Secure Lossy Source-Channel Wiretapping with Side Information at the Receiving Terminals Search on Bibsonomy CoRR The full citation details ... 2011 DBLP  BibTeX  RDF
26Susan Landau 0001 Surveillance Or Security? The Risks Posed by New Wiretapping Technologies Search on Bibsonomy 2011   RDF
26Joffrey Villard, Pablo Piantanida, Shlomo Shamai Secure lossy source-channel wiretapping with side information at the receiving terminals. Search on Bibsonomy ISIT The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
26Qin Guo, Mingxing Luo, Lixiang Li 0001, Yixian Yang Secure Network Coding against Wiretapping and Byzantine Attacks. Search on Bibsonomy EURASIP J. Wirel. Commun. Netw. The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
26Arwen Mullikin, Syed M. Rahman Ethical Dilemma of Governmental Wiretapping Search on Bibsonomy CoRR The full citation details ... 2010 DBLP  BibTeX  RDF
26Tao Cui, Tracey Ho, Jörg Kliewer On secure network coding with unequal link capacities and restricted wiretapping sets. Search on Bibsonomy ITW The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
26Haris Aziz 0001, Oded Lachish, Mike Paterson, Rahul Savani Wiretapping a hidden network Search on Bibsonomy CoRR The full citation details ... 2009 DBLP  BibTeX  RDF
26Josh Karlin, Stephanie Forrest, Jennifer Rexford Nation-State Routing: Censorship, Wiretapping, and BGP Search on Bibsonomy CoRR The full citation details ... 2009 DBLP  BibTeX  RDF
26Haris Aziz 0001, Oded Lachish, Mike Paterson, Rahul Savani Wiretapping a Hidden Network. Search on Bibsonomy WINE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
26T. D. Wilson 0001 Review of: Diffie, Whitfield & Landau, S. Privacy on the line: the politics of wiretapping and encryption. Updated and expanded edition. Cambridge, MA: The MIT Press, 2007. Search on Bibsonomy Inf. Res. The full citation details ... 2008 DBLP  BibTeX  RDF
26Whitfield Diffie, Susan Landau 0001 Privacy on the line: the politics of wiretapping and encryption. Search on Bibsonomy SIGACT News The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
26Kim-Kwang Raymond Choo Privacy on the Line: The Politics of Wiretapping and Encryption, Updated and Expanded Edition. Search on Bibsonomy Comput. J. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
26Mohammad Ravanbakhsh, Mehdi M. Hassanzadeh, Dag Haugland Wiretapping Based on Node Corruption over Secure Network Coding: Analysis and Optimization. Search on Bibsonomy ICMCTA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
26Whitfield Diffie, Susan Landau 0001 Privacy on the line - the politics of wiretapping and encryption (updated expanded ed.). Search on Bibsonomy 2007   RDF
26Kamal Jain Security based on network topology against the wiretapping attack. Search on Bibsonomy IEEE Wirel. Commun. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
26Internet Architecture Board, Internet Engineering Steering Group IETF Policy on Wiretapping. Search on Bibsonomy RFC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
26Thomas A. Peters Privacy on the Line: The Politics of Wiretapping and Encryption, by Whitfield Diffie and Susan Landau. Search on Bibsonomy J. Am. Soc. Inf. Sci. The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
26Marc Rotenberg Wiretapping Bill: Costly and Intrusive. Search on Bibsonomy Computerization and Controversy, 2nd Ed. The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
26David Kahn A Soviet Wiretapping Office. Search on Bibsonomy Cryptologia The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
23Steven M. Bellovin, Matt Blaze, Whitfield Diffie, Susan Landau 0001, Peter G. Neumann, Jennifer Rexford Risking Communications Security: Potential Hazards of the Protect America Act. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
23Lijuan Geng, Feng Lu, Ying-Chang Liang, Francois P. S. Chin Secure multi-path construction in wireless sensor networks using network coding. Search on Bibsonomy PIMRC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
23Klara A. Weiand, Jos S. Bouten, Cor J. Veenman Similarity Visualization for the Grouping of Forensic Speech Recordings. Search on Bibsonomy IWCF The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
23Albert Gidari Designing the right wiretap solution: setting standards under CALEA. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
23Shiping Chen 0003, Xinyuan Wang 0005, Sushil Jajodia On the anonymity and traceability of peer-to-peer VoIP calls. Search on Bibsonomy IEEE Netw. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
23Francesco Palmieri 0002, Ugo Fiore Securing the MPLS Control Plane. Search on Bibsonomy HPCC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF strong authentication, label distribution, integrity, MPLS, signaling
23Robert Tracz, Konrad S. Wrona Fair electronic cash withdrawal and change return for wireless networks. Search on Bibsonomy Workshop Mobile Commerce The full citation details ... 2001 DBLP  DOI  BibTeX  RDF electronic commerce, payment systems, wireless applications
23Mohammed Inam Ul Haq Insuring individual's privacy from statistical data base users. Search on Bibsonomy AFIPS National Computer Conference The full citation details ... 1975 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #67 of 67 (100 per page; Change: )
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license