{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T16:51:44Z","timestamp":1742403104421},"publisher-location":"Berlin, Heidelberg","reference-count":22,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540427865"},{"type":"electronic","value":"9783540455080"}],"license":[{"start":{"date-parts":[[2001,1,1]],"date-time":"2001-01-01T00:00:00Z","timestamp":978307200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2001]]},"DOI":"10.1007\/3-540-45508-6_13","type":"book-chapter","created":{"date-parts":[[2007,8,6]],"date-time":"2007-08-06T17:42:55Z","timestamp":1186422175000},"page":"175-192","source":"Crossref","is-referenced-by-count":5,"title":["The Impact of Confidentiality on Quality of Service in Heterogeneous Voice over IP Networks"],"prefix":"10.1007","author":[{"given":"Johnathan M.","family":"Reason","sequence":"first","affiliation":[]},{"given":"David G.","family":"Messerschmitt","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2001,10,10]]},"reference":[{"key":"13_CR1","doi-asserted-by":"publisher","first-page":"523","DOI":"10.1007\/3-540-39799-X_41","volume-title":"Advances in Cryptology-Proc. of CRYPTO\u2019 85","author":"A. Webster","year":"1986","unstructured":"A. Webster and S. E. Tavares, On the design of S-boxes, in H. C. Williams (Ed.): Advances in Cryptology-Proc. of CRYPTO\u2019 85, Springer-Verlag, NY, pp. 523\u2013534, 1986."},{"key":"13_CR2","unstructured":"National Institute for Standards and Technology, Data Encryption Standard (DES), FIPS PUB 46-2, US Department of Commerce, Dec. 30, 1993."},{"key":"13_CR3","volume-title":"On the design and security of block ciphers, ETH Series in Info. Proc.","author":"L. X","year":"1992","unstructured":"X. Lai, On the design and security of block ciphers, ETH Series in Info. Proc., vol. 1, Konstanz: Hartung-Gorre Verlag, 1992."},{"key":"13_CR4","unstructured":"National Institute for Standards and Technology, DES Modes of Operation, FIPS PUB 46-2, US Department of Commerce, Dec. 2, 1980."},{"key":"13_CR5","unstructured":"J. Reason, End-to-end Confidentiality for Continuous-media Applications in Wireless Systems, Dissertation, UC Berkeley, December 2000."},{"key":"13_CR6","unstructured":"S. Casner, R. Frederick, and V. Jacobson, RTP: A Transport Protocol for Real-Time Applications, IETF, RFC 1889, January, 1996."},{"key":"13_CR7","doi-asserted-by":"crossref","unstructured":"C. Bormann et al, RObust Header Compression (ROHC): Framework and four profiles: RTP, UDP, ESP, and uncompressed, IETF, http:\/\/draft-ietf-rohc-rtp-09 , Feb. 2001.","DOI":"10.17487\/rfc3095"},{"key":"13_CR8","doi-asserted-by":"crossref","unstructured":"Bo Li; Hamdi, M.; Dongyi Iang; Xi-Ren Cao; Hou, Y.T., QoS enabled voice support in the next generation Internet: issues, existing approaches and challenges, IEEE Communications Magazine, Volume: 38 Issue: 4, April 2000","DOI":"10.1109\/35.833557"},{"key":"13_CR9","unstructured":"The Bluetooth Special Interest Group, Bluetooth Specification, http:\/\/www.bluetooth.com , Dec. 1999."},{"key":"13_CR10","unstructured":"Recommendation GSM 06.10, GSM Full Rate Speech Transcoding, ETSI, Feb. 1992."},{"key":"13_CR11","doi-asserted-by":"crossref","unstructured":"B. Skylar, Rayleigh fading channels in mobile digital communication systems part ii: mitigation, IEEE Communications Magazine, pp. 102\u2013109, July 1997.","DOI":"10.1109\/35.601748"},{"key":"13_CR12","unstructured":"L. Yun and D.G. Messerschmitt, Power control and coding for variable QOS on a CDMA channel, Proc. IEEE MILCOM Conf., Fort Monmouth, NJ, Oct 2-4, 1994."},{"issue":"2","key":"13_CR13","doi-asserted-by":"publisher","first-page":"313","DOI":"10.1109\/25.289412","volume":"40","author":"R. L. Pickholtz","year":"1991","unstructured":"R. L. Pickholtz, et. al., Spread spectrum for mobile communications, IEEE Transactions on Vehicular Technology, Vol. 40, NO. 2, pp. 313\u2013321, May, 1991.","journal-title":"IEEE Transactions on Vehicular Technology"},{"issue":"8","key":"13_CR14","doi-asserted-by":"publisher","first-page":"795","DOI":"10.1109\/TCOM.1977.1093915","volume":"COM-25","author":"M. B. Pursley","year":"1977","unstructured":"M. B. Pursley, Performance evaluation for phase-coded spread-spectrum multipleaccess communication-part I: system analysis, IEEE Trans. on Comm., Vol.COM-25, NO. 8, pp. 795\u2013799, August 1977.","journal-title":"IEEE Trans. on Comm."},{"issue":"5","key":"13_CR15","first-page":"488","volume":"COM-34","author":"P. J. Lee","year":"1986","unstructured":"P. J. Lee, Computation of the bit error rate of coherent M-ary PSK with Gray Code bit mapping, IEEE Trans. on Comm., Vol. COM-34, NO. 5, pp. 488\u2013491, May, 1986.","journal-title":"IEEE Trans. on Comm."},{"key":"13_CR16","unstructured":"B. Schneier, J. Kelsey, D. Whiting, D. Wagner, C. Hall, and N. Ferguson, The Twofish Encryption Algorithm, John Wiley & Sons, 1999."},{"key":"13_CR17","doi-asserted-by":"crossref","unstructured":"J. Kelsey, B. Schneier, and N. Ferguson, Yarrow-160: Notes on the Design and Analysis of the Yarrow Cryptographic Pseudorandom Number Generator, Sixth Annual Workshop on Selected Areas in Cryptography, Springer Verlag, August 1999.","DOI":"10.1007\/3-540-46513-8_2"},{"key":"13_CR18","unstructured":"ANSI X9.17 (Revised), American national standard for financial institution Key management (wholesale), American Bankers Association, 1985."},{"key":"13_CR19","unstructured":"P. Gutmann, Software generation of random numbers for cryptographic purposes, Proceedings of the 1998 Usenix Security Symposium, 1998."},{"key":"13_CR20","unstructured":"National Institute for Standards and Technology, Key Management Using X9.17, FIPS PUB 171, US Department of Commerce, 1992."},{"key":"13_CR21","unstructured":"P. Zimmermann, The Official PGP User\u2019s Guide, MIT Press, 1995."},{"key":"13_CR22","unstructured":"J. Walker and B. C. Wiles, Speak Freely, http:\/\/www.speakfreely.org , 1999."}],"container-title":["Lecture Notes in Computer Science","Management of Multimedia on the Internet"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-45508-6_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,1]],"date-time":"2019-05-01T19:46:13Z","timestamp":1556739973000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-45508-6_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2001]]},"ISBN":["9783540427865","9783540455080"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/3-540-45508-6_13","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2001]]}}}