. . . . "Hranick\u00FD, Radek" . . "RIV/00216305:26230/14:PU111992" . . "Lawful interception, intercept related information, content of communication, user identities, identification, linkability"@en . "2" . "34299" . . "14"^^ . . . "1558-7215" . "On Identities in Modern Networks" . "P(VG20102015022), S" . "Mart\u00EDnek, Tom\u00E1\u0161" . . "RIV/00216305:26230/14:PU111992!RIV15-MV0-26230___" . . . . "[474D56E97A63]" . "Communicating parties inside computer networks use different kind of identifiers. Some of these identifiers are stable, e.g., logins used to access a specific service, some are only temporary, e.g., dynamically assigned IP addresses. This paper tackles several challenges of lawful interception that emerged in modern networks. The main contribution is the graph model that links identities learnt from various sources distributed in a network. The inferred identities result into an interception of more detailed data in conformance with the issued court order. The approach deals with network address translation, short-lived identifiers and simultaneous usage of different identities. The approach was evaluated to be viable during real network testing based on various means to learn identities of users connected to a network." . "26230" . . "3"^^ . "On Identities in Modern Networks"@en . . "US - Spojen\u00E9 st\u00E1ty americk\u00E9" . "On Identities in Modern Networks" . "http://ojs.jdfsl.org/index.php/jdfsl/issue/view/37" . "Communicating parties inside computer networks use different kind of identifiers. Some of these identifiers are stable, e.g., logins used to access a specific service, some are only temporary, e.g., dynamically assigned IP addresses. This paper tackles several challenges of lawful interception that emerged in modern networks. The main contribution is the graph model that links identities learnt from various sources distributed in a network. The inferred identities result into an interception of more detailed data in conformance with the issued court order. The approach deals with network address translation, short-lived identifiers and simultaneous usage of different identities. The approach was evaluated to be viable during real network testing based on various means to learn identities of users connected to a network."@en . "2014" . . "Pol\u010D\u00E1k, Libor" . . . "3"^^ . "The Journal of Digital Forensics, Security and Law" . . "On Identities in Modern Networks"@en . . .