{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T07:06:22Z","timestamp":1725519982400},"reference-count":22,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,7]]},"DOI":"10.1109\/trustcom.2013.80","type":"proceedings-article","created":{"date-parts":[[2013,12,17]],"date-time":"2013-12-17T19:46:29Z","timestamp":1387309589000},"page":"659-666","source":"Crossref","is-referenced-by-count":5,"title":["Securing RTP Packets Using Per-Packet Selective Encryption Scheme for Real-Time Multimedia Applications"],"prefix":"10.1109","author":[{"given":"Younchan","family":"Jung","sequence":"first","affiliation":[]},{"given":"Enrique","family":"Festijo","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","first-page":"1","article-title":"The gilbert-elliott model for packet loss in real time services on the internet","author":"hasslinger","year":"2008","journal-title":"Measuring Modelling and Evaluation of Computer and Communication Systems (MMB) 2008 14th GI\/ITG Conference"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/ICCS.2010.5686489"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2008.2000670"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/URKE.2012.6319534"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/NSS.2009.90"},{"journal-title":"RFC 2631 (Proposed Standard) Internet Engineering Task Force","article-title":"Diffie-hellman key agreement method","year":"0","author":"rescorla","key":"16"},{"journal-title":"RFC 4568 (Proposed Standard) Internet Engineering Task Force July","article-title":"Session description protocol (sdp) security descriptions for media streams","year":"0","author":"andreasen","key":"13"},{"journal-title":"A Technical Report","article-title":"Rfc 5246-the transport layer security (tls) protocol version 1.2","year":"0","author":"dierks","key":"14"},{"journal-title":"RFC 3711 (Proposed Standard) Internet Engineering Task Force","article-title":"The secure real-time transport protocol (srtp)","year":"0","author":"baugher","key":"11"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.17487\/rfc6189"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1109\/icc.2011.5963331"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2012.6364948"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1109\/IDAACS-SWS.2012.6377649"},{"journal-title":"RFC 3830 (Proposed Standard) Internet Engineering Task Force","article-title":"Mikey: Multimedia internet keying","year":"0","author":"arkko","key":"2"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/ISM.2008.67"},{"key":"10","first-page":"482","article-title":"Session key exchange and mutual authentication scheme between mobile machines in wlan based ad hoc networks","author":"roh","year":"2010","journal-title":"Information and Communication Technology Convergence (ICTC) 2010 International Conference on"},{"journal-title":"RFC 1889 (Proposed Standard) Internet Engineering Task Force","article-title":"Rtp: A transport protocol for realtime applications","year":"1996","author":"group","key":"7"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.4218\/etrij.13.0212.0549"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/ECTICon.2012.6254320"},{"key":"4","first-page":"276","article-title":"A key agreement protocol for p2p voip applications","author":"pecori","year":"2009","journal-title":"Software Telecommunications Computer Networks 2009 SoftCOM 2009 17th International Conference on"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/ChinaCom.2011.6158174"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2010.31"}],"event":{"name":"2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)","start":{"date-parts":[[2013,7,16]]},"location":"Melbourne, Australia","end":{"date-parts":[[2013,7,18]]}},"container-title":["2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6679587\/6680793\/06680899.pdf?arnumber=6680899","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,23]],"date-time":"2017-03-23T00:22:22Z","timestamp":1490228542000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6680899\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,7]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/trustcom.2013.80","relation":{},"subject":[],"published":{"date-parts":[[2013,7]]}}}