{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,1,11]],"date-time":"2024-01-11T00:06:34Z","timestamp":1704931594646},"reference-count":14,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"8","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEICE Trans. Commun."],"published-print":{"date-parts":[[2011]]},"DOI":"10.1587\/transcom.e94.b.2235","type":"journal-article","created":{"date-parts":[[2011,8,1]],"date-time":"2011-08-01T06:23:59Z","timestamp":1312179839000},"page":"2235-2238","source":"Crossref","is-referenced-by-count":0,"title":["Design and Implementation of One-Way Key Agreement Model for Enhancing VoIP Internet Phone Security"],"prefix":"10.23919","volume":"E94-B","author":[{"given":"Kyusuk","family":"HAN","sequence":"first","affiliation":[{"name":"Korea Advanced Institute of Science and Technology"}]},{"given":"Taeshik","family":"SHON","sequence":"additional","affiliation":[{"name":"Division of Information and Computer Engineering, College of Information Technology, Ajou University"}]},{"given":"Kwangjo","family":"KIM","sequence":"additional","affiliation":[{"name":"Korea Advanced Institute of Science and Technology"}]}],"member":"263","reference":[{"key":"1","unstructured":"[1] P. Thermos and A. Takanen, Securing VoIP Networks: Threats, Vulnerabilities, and Countermeasures, Addison-Wesley Professional, 2007."},{"key":"2","doi-asserted-by":"crossref","unstructured":"[2] L.D. Cicco and S. Mascolo, “A mathematical model of the Skype VoIP congestion control algorithm,” IEEE Trans. Autom. Control, vol.55, no.3, pp.790-795, 2010.","DOI":"10.1109\/TAC.2010.2040502"},{"key":"3","doi-asserted-by":"crossref","unstructured":"[3] J. Peterson and C. Jennings, “Enhancements for authenticated identity management in the session initiation protocol (SIP),” RFC4474, Aug. 2006.","DOI":"10.17487\/rfc4474"},{"key":"4","doi-asserted-by":"crossref","unstructured":"[4] L. Kong, V.A. Balasubramaniyan, and M. Ahamad, “A lightweight scheme for securely and reliably locating SIP users,” 1st IEEE Workshop on VoIP Management and Security (VoIP MaSe 2006), 2006.","DOI":"10.1109\/VOIPMS.2006.1638117"},{"key":"5","unstructured":"[5] J. Ring, K.R. Choo, E. Foo, and M. Looi, “A new authentication mechanism and key agreement protocol for SIP using identity-based cryptography,” Proc. AusCERT Asia Pacific Information Technology Security Conference, 2006."},{"key":"6","unstructured":"[6] T. Okamoto, R. Tso, and E. Okamoto, “One-way and two-party authenticated ID-based key agreement protocols using pairing,” Modeling Decisions for Artificial Intel ligence, Second International Conference, MDAI 2005, vol.3558, no.2005, pp.122-133, Tsukuba, Japan, 2005."},{"key":"7","unstructured":"[7] F. Hess, “Efficient identity based signature schemes based on pairings,” 9th Annual International Workshop, SAC 2002, vol.2595, no.2003, pp.310-324, 2002."},{"key":"8","doi-asserted-by":"crossref","unstructured":"[8] M. Baugher, R. Canetti, L. Dondeti, and F. Lindholm, “Multicast security (MSEC) group key management architecture,” IETF RFC 4046, 2005.","DOI":"10.17487\/rfc4046"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-73489-5_10"},{"key":"10","unstructured":"[10] D. Hankerson, A. Menezes, and M. Scott, “Software implementation of pairings,” in Identity-Based Cryptography, ed. M. Joye and G. Neven, May 2008."},{"key":"11","unstructured":"[11] B. Lynn, On the implementation of pairing-based cryptosystems, Ph.D. Thesis, Stanford University, 2007."},{"key":"12","unstructured":"[12] Nvidia, “Coremark performance on Kal-El (Kal-El vs. Tegra 2 vs Core2Duo T7200),” (Youtube), Feb. 2011."},{"key":"13","unstructured":"[13] J. Davidson, J. Peters, M. Bhatia, S. Kalidindi, and S. Mukherjee, VoIP: An In-Depth Analysis, in Voice over IP Fundamentals, 2nd ed., Cisco Press, 2006."},{"key":"14","unstructured":"[14] C. Yeun, K. Han, and K. Kim, “New novel approaches for securing VoIP applications,” Proc. Sixth International Workshop for Applied PKI Conference (IWAP'07), Perth, Australia, Dec. 2007."}],"container-title":["IEICE Transactions on Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.jstage.jst.go.jp\/article\/transcom\/E94.B\/8\/E94.B_8_2235\/_pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,10]],"date-time":"2024-01-10T14:56:31Z","timestamp":1704898591000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.jstage.jst.go.jp\/article\/transcom\/E94.B\/8\/E94.B_8_2235\/_article"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"references-count":14,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2011]]}},"URL":"https:\/\/doi.org\/10.1587\/transcom.e94.b.2235","relation":{},"ISSN":["0916-8516","1745-1345"],"issn-type":[{"value":"0916-8516","type":"print"},{"value":"1745-1345","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011]]}}}