{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T22:24:19Z","timestamp":1725488659815},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540564133"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/3-540-47555-9_36","type":"book-chapter","created":{"date-parts":[[2007,8,8]],"date-time":"2007-08-08T19:23:49Z","timestamp":1186601029000},"page":"437-448","source":"Crossref","is-referenced-by-count":0,"title":["Secure Audio Teleconferencing: A Practical Solution"],"prefix":"10.1007","author":[{"given":"Rafi","family":"Heiman","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"36_CR1","series-title":"Lect Notes Comput Sci","first-page":"418","volume-title":"Advances in cryptology \u2014 CRYPTO\u2019 87","author":"E.F. Brickell","year":"1987","unstructured":"E.F. Brickell, P.J. Lee, and Y. Yacobi. Secure audio teleconference, volume 293 of Lecture notes in computer science: Advances in cryptology \u2014 CRYPTO\u2019 87, pages 418\u2013426. Springer-Verlag, 1987."},{"key":"36_CR2","unstructured":"International Telegraph and Telephone Consultative Committee. Pulse Code Modulation (PCM) of voice frequencies. CCITT recommendation G.711, Geneva, 1972."},{"key":"36_CR3","unstructured":"International Telegraph and Telephone Consultative Committee. Frame structure for a 64 to 1920 kbit\/s channel in audiovisual systems, 1990. CCITT recommendation H.221."},{"key":"36_CR4","doi-asserted-by":"publisher","first-page":"193","DOI":"10.1080\/0161-118691861001","volume":"10","author":"J.M. Carrol","year":"1986","unstructured":"J.M. Carrol and S. Martin. The automated cryptanalysis of substitution ciphers. Cryptologia, 10:193\u2013209, 1986.","journal-title":"Cryptologia"},{"key":"36_CR5","doi-asserted-by":"publisher","first-page":"193","DOI":"10.1080\/0161-118791862018","volume":"11","author":"J.M. Carrol","year":"1987","unstructured":"J.M. Carrol and L.E. Robbins. The automated cryptanalysis of polyalphabetic ciphers. Cryptologia, 11:193\u2013205, 1987.","journal-title":"Cryptologia"},{"key":"36_CR6","unstructured":"The National Bureau of Standards. Data Encryption Standard, January 1977. U.S. department of Commerce, FIPS pub. 46."},{"key":"36_CR7","doi-asserted-by":"crossref","unstructured":"B. Goldburg, E. Dawson, and S. Sridharan. The automated cryptanalysis of analog speech scramblers. In Advances in Cryptology, Eurocrypt, pages 422\u2013430, 1991.","DOI":"10.1007\/3-540-46416-6_36"},{"key":"36_CR8","volume-title":"Digital coding of waveforms: principles and applications to speech and video","author":"N.S. Jayant","year":"1984","unstructured":"N.S. Jayant and P. Noll. Digital coding of waveforms: principles and applications to speech and video. Prentice-Hall Inc., Englewood Cliffs, N.J., 1984."},{"key":"36_CR9","unstructured":"J.L. Massey. private communication."},{"key":"36_CR10","unstructured":"Electrospace Systems Inc. MDS-1 video conferencing bridge, manuscript. Mail stop 4000, p.o.box 831359, Richardson, Texas 75083-1359, 1991."},{"key":"36_CR11","doi-asserted-by":"crossref","unstructured":"J. Makhoul, S. Roucos, and H. Gish. Vector quantization in speech coding. Proc. of the IEEE, 73(11), November 1985.","DOI":"10.1109\/PROC.1985.13340"},{"issue":"12","key":"36_CR12","doi-asserted-by":"publisher","first-page":"1460","DOI":"10.1109\/PROC.1983.12801","volume":"71","author":"M. V. Pitke","year":"1983","unstructured":"M. V. Pitke and T. Chandrasekaran. An improved conference circuit. Proc. of IEEE, 71(12):1460\u20131461, 1983.","journal-title":"Proc. of IEEE"},{"issue":"11","key":"36_CR13","doi-asserted-by":"publisher","first-page":"1687","DOI":"10.1109\/PROC.1985.13352","volume":"73","author":"M. V. Pitke","year":"1985","unstructured":"M. V. Pitke and T. Chandrasekaran. A digital conferencing technique. Proc. of IEEE, 73(11):1687\u20131688, 1985.","journal-title":"Proc. of IEEE"},{"issue":"6","key":"36_CR14","doi-asserted-by":"publisher","first-page":"1069","DOI":"10.1109\/TCOM.1971.1090767","volume":"19","author":"S. G. Pitroda","year":"1971","unstructured":"S. G. Pitroda and B. J. Rekiere. A digital conference circuit for an instant speaker algorithm. IEEE transactions on communication technology, com-19(6):1069\u20131076, December 1971.","journal-title":"IEEE transactions on communication technology"},{"key":"36_CR15","unstructured":"L.R. Rabiner and R.W. Schafer. Digital processing of speech signals. Prentice-Hall, 1979."},{"key":"36_CR16","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"R. Rivest","year":"1978","unstructured":"R. Rivest, A. Shamir, and L. Adelman. A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, 21:120\u2013126, 1978.","journal-title":"Communications of the ACM"},{"key":"36_CR17","doi-asserted-by":"crossref","unstructured":"A. Shimizu and S. Miyaguchi. Fast data encryption algorithm (FEAL). In Advances in Cryptology, Eurocrypt, pages 267\u2013267, 1987.","DOI":"10.1007\/3-540-39118-5_24"},{"key":"36_CR18","series-title":"Lect Notes Comput Sci","first-page":"520","volume-title":"Advances in cryptology \u2014 CRYPTO\u2019 88","author":"D.G. Steer","year":"1988","unstructured":"D.G. Steer, L. Strawczynski, W. Diffie, and M. Wiener. A secure audio teleconference system, volume 403 of Lecture notes in computer science: Advances in cryptology \u2014 CRYPTO\u2019 88, pages 520\u2013528. Springer-Verlag, 1988."}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 EUROCRYPT\u2019 92"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-47555-9_36.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T16:14:02Z","timestamp":1605629642000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-47555-9_36"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540564133"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/3-540-47555-9_36","relation":{},"subject":[]}}