{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T07:08:13Z","timestamp":1725520093052},"reference-count":37,"publisher":"Elsevier BV","issue":"6","license":[{"start":{"date-parts":[[2009,9,1]],"date-time":"2009-09-01T00:00:00Z","timestamp":1251763200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computers & Security"],"published-print":{"date-parts":[[2009,9]]},"DOI":"10.1016\/j.cose.2009.01.004","type":"journal-article","created":{"date-parts":[[2009,1,20]],"date-time":"2009-01-20T09:09:38Z","timestamp":1232442578000},"page":"433-449","source":"Crossref","is-referenced-by-count":23,"title":["Providing true end-to-end security in converged voice over IP infrastructures"],"prefix":"10.1016","volume":"28","author":[{"given":"Francesco","family":"Palmieri","sequence":"first","affiliation":[]},{"given":"Ugo","family":"Fiore","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.cose.2009.01.004_bib4","series-title":"Proceedings 3rd annual PKI R&D workshop","article-title":"PKI: ten years later","author":"Adams","year":"2004"},{"key":"10.1016\/j.cose.2009.01.004_bib28","article-title":"Internet low bit rate codec (iLBC)","author":"Andersen","year":"2004","journal-title":"IETF RFC 3951"},{"key":"10.1016\/j.cose.2009.01.004_bib7","article-title":"The Secure Real-Time Transport Protocol (SRTP)","author":"Baugher","year":"2004","journal-title":"IETF RFC 3711"},{"key":"10.1016\/j.cose.2009.01.004_bib22","doi-asserted-by":"crossref","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","article-title":"New directions in cryptography","author":"Diffie","year":"1976","journal-title":"IEEE Transactions on Information Theory"},{"key":"10.1016\/j.cose.2009.01.004_bib29","article-title":"Real-time transport protocol (RTP) payload format for Internet low bit rate codec (iLBC) speech","author":"Duric","year":"2004","journal-title":"IETF RFC 3952"},{"key":"10.1016\/j.cose.2009.01.004_bib35","unstructured":"Fischer K. End-to-End security for DTLS-SRTP. IETF DRAFT , 2008."},{"key":"10.1016\/j.cose.2009.01.004_bib34","unstructured":"Fischl J, Tschofenig H, Rescorla E. Framework for establishing an SRTP security context using DTLS. IETF DRAFT , 2008."},{"key":"10.1016\/j.cose.2009.01.004_bib24","article-title":"Security multiparts for mime: multipart\/signed and multipart\/encrypted","author":"Galvin","year":"1995","journal-title":"IETF RFC 1847"},{"key":"10.1016\/j.cose.2009.01.004_bib11","doi-asserted-by":"crossref","unstructured":"Guo JI, Yen JC, Pai HF, New voice over internet protocol technique with hierarchical data security protection. In: IEE Proceedings vision, image & signal processing, vol. 149, no. 4; 2002. p. 237\u201343.","DOI":"10.1049\/ip-vis:20020457"},{"key":"10.1016\/j.cose.2009.01.004_bib14","article-title":"SDP: session description protocol","author":"Handley","year":"1998","journal-title":"IETF RFC 2327"},{"key":"10.1016\/j.cose.2009.01.004_bib3","article-title":"Internet X.509 public key infrastructure certificate and CRL profile","author":"Housley","year":"1999","journal-title":"IETF RFC 2459"},{"key":"10.1016\/j.cose.2009.01.004_bib21","unstructured":"ITU-T. Coding of speech at 8 Kbit\/s using conjugate-structure algebraic-code-excited linear prediction (CS-ACELP). ITU-T Recommendation G.729; 1996."},{"key":"10.1016\/j.cose.2009.01.004_bib30","unstructured":"Itu-T. Mean opinion score (MOS). ITU-T recommendation P800; 1996."},{"key":"10.1016\/j.cose.2009.01.004_bib33","unstructured":"Itu-T. Provisional planning values for the equipment impairment factor Ie and packet-loss robustness factor Bpl. ITU-T Recommendation G.113 appendix I; 2002."},{"key":"10.1016\/j.cose.2009.01.004_bib2","unstructured":"Itu-T. Packet based multimedia communication systems. ITU-T Recommendation H.323; 2003."},{"key":"10.1016\/j.cose.2009.01.004_bib17","series-title":"Second AES candidate conference","article-title":"Performance analysis of AES candidates on the 6805 CPU core","author":"Keating","year":"1999"},{"key":"10.1016\/j.cose.2009.01.004_bib8","article-title":"Security architecture for the Internet protocol","author":"Kent","year":"1998","journal-title":"IETF RFC 2401"},{"key":"10.1016\/j.cose.2009.01.004_bib6","series-title":"Trust models and management in public-key infrastructures","author":"Linn","year":"2000"},{"key":"10.1016\/j.cose.2009.01.004_bib9","article-title":"Datagram transport layer security","author":"Modadugu","year":"2006","journal-title":"IETF RFC 4347"},{"key":"10.1016\/j.cose.2009.01.004_bib31","unstructured":"Mullin J, Smallwood L, Watson A, Wilson G, New techniques for assessing audio and video quality in real-time interactive communications. IHM-HCI Tutorial; 2001."},{"key":"10.1016\/j.cose.2009.01.004_bib10","volume":"vol. 97","author":"National Institute of Standards and Technology","year":"2001"},{"issue":"6","key":"10.1016\/j.cose.2009.01.004_bib5","doi-asserted-by":"crossref","DOI":"10.1109\/65.806987","article-title":"An overview of PKI trust models","volume":"13","author":"Perlman","year":"1999","journal-title":"IEEE Network"},{"key":"10.1016\/j.cose.2009.01.004_bib36","article-title":"Enhancements for authenticated identity management in the Session Initiation Protocol (SIP)","author":"Peterson","year":"2006","journal-title":"IETF RFC 4474"},{"key":"10.1016\/j.cose.2009.01.004_bib12","author":"PGP Corporation"},{"key":"10.1016\/j.cose.2009.01.004_bib23","article-title":"S\/MIME version 3 message specification","volume":"2633","author":"Ramsdell","year":"1999","journal-title":"IETF RFC"},{"key":"10.1016\/j.cose.2009.01.004_bib25","author":"ReSIProcate Staff"},{"key":"10.1016\/j.cose.2009.01.004_bib1","article-title":"SIP: session initiation protocol","author":"Rosenberg","year":"2002","journal-title":"IETF RFC 3261"},{"key":"10.1016\/j.cose.2009.01.004_bib19","series-title":"Third AES candidate conference","article-title":"A performance comparison of the five AES finalists","author":"Schneier","year":"2000"},{"key":"10.1016\/j.cose.2009.01.004_bib16","author":"Schneier"},{"key":"10.1016\/j.cose.2009.01.004_bib26","author":"Shneier"},{"key":"10.1016\/j.cose.2009.01.004_bib13","author":"Skype"},{"key":"10.1016\/j.cose.2009.01.004_bib15","series-title":"Cryptography and network security principles and practice","author":"Stallings","year":"1999"},{"key":"10.1016\/j.cose.2009.01.004_bib27","author":"Valin"},{"key":"10.1016\/j.cose.2009.01.004_bib20","series-title":"A comparison of AES candidates on the Alpha 21264, third AES candidate conference","author":"Weiss","year":"2000"},{"key":"10.1016\/j.cose.2009.01.004_bib18","series-title":"Third AES candidate conference","article-title":"How well are high-end DSPs suited for the AES algorithms?","author":"Wollinger","year":"2000"},{"key":"10.1016\/j.cose.2009.01.004_bib32","series-title":"Proceedings of the 16th USENIX security symposium","first-page":"43","article-title":"Language identification of encrypted VoIP traffic: Alejandra y Roberto or Alice and Bob?","author":"Wright","year":"2007"},{"key":"10.1016\/j.cose.2009.01.004_bib37","unstructured":"Zimmermann P, Media path key agreement for secure RTP. IETF Draft , 2009."}],"container-title":["Computers & Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0167404809000054?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0167404809000054?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,5,17]],"date-time":"2019-05-17T10:56:08Z","timestamp":1558090568000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0167404809000054"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,9]]},"references-count":37,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2009,9]]}},"alternative-id":["S0167404809000054"],"URL":"https:\/\/doi.org\/10.1016\/j.cose.2009.01.004","relation":{},"ISSN":["0167-4048"],"issn-type":[{"value":"0167-4048","type":"print"}],"subject":[],"published":{"date-parts":[[2009,9]]}}}