{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T00:00:30Z","timestamp":1725494430677},"publisher-location":"Boston, MA","reference-count":33,"publisher":"Springer US","isbn-type":[{"type":"print","value":"9780387723662"},{"type":"electronic","value":"9780387723679"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007]]},"DOI":"10.1007\/978-0-387-72367-9_31","type":"book-chapter","created":{"date-parts":[[2007,11,9]],"date-time":"2007-11-09T18:12:08Z","timestamp":1194631928000},"page":"361-372","source":"Crossref","is-referenced-by-count":6,"title":["Non-Repudiation in Internet Telephony"],"prefix":"10.1007","author":[{"given":"Nicolai","family":"Kuntze","sequence":"first","affiliation":[]},{"given":"Andreas U.","family":"Schmidt","sequence":"additional","affiliation":[]},{"given":"Christian","family":"Hett","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"31_CR1","unstructured":"Kavanagh, J.: Voice over IP special report: From dial to click. http:\/\/www.computerweekly.com\/Articles\/2006\/02\/14\/214129\/VoiceoverIPspecialreportFromdialtoclick.html , visited 1.3.2006."},{"key":"31_CR2","doi-asserted-by":"crossref","unstructured":"Baugher, M., et al: The Secure Real-time Transport Protocol (SRTP). RFC 3711, IETF, March 2004. http:\/\/www.ietf.org\/rfc\/rfc3711.txt","DOI":"10.17487\/rfc3711"},{"key":"31_CR3","volume-title":"Recording-telephone","author":"T.A. Edison","year":"1911","unstructured":"Edison, T.A.: Recording-telephone. United States Patent P.No.:l,012,250, United States Patent Office, Washington, DC (1911) Patented Dec. 19, 1911."},{"key":"31_CR4","unstructured":"Mcrklc, R.C.: A certified digital signature. In Brassard, G., ed.: Advances in Cryptology (CRYPTO\u2019 89). Number 435 in LNCS, Springer-Verlag (1989) 218\u2013238 Republication of the 1979 original."},{"key":"31_CR5","unstructured":"Strasser, M.: M\u00f6glichkeiten zur Gestaltung verbindlicher Tclckoopcration. Master\u2019s thesis, Universit\u00e4t Freiburg, Institut f\u00fcr Informatik und Gesellschaft (2001)"},{"key":"31_CR6","unstructured":"Kabatnik, M., Keck, D.O., M. Kreutzer, A.Z.: Multilateral security in intelligent networks. In: Proceedings of the IEEE Intelligent Network Workshop. (2000) 59\u201365"},{"key":"31_CR7","unstructured":"Poh, N., Bengio, S.: Noise-Robust Multi-Stream Fusion for Text-Independent Speaker Authentication. In: Proceedings of The Speaker and Language Recognition Workshop (Odyssey). (2004)"},{"key":"31_CR8","doi-asserted-by":"publisher","first-page":"377","DOI":"10.1049\/ip-vis:20031034","volume":"150","author":"L. Rodriguez-Linares","year":"2003","unstructured":"Rodriguez-Linares, L., Garcia-Mateo, C: Application of fusion techniques to speaker authentication over IP networks. IEEE Proceedings-Vision Image and Signal Processing 150 (2003) 377\u2013382","journal-title":"IEEE Proceedings-Vision Image and Signal Processing"},{"key":"31_CR9","volume-title":"Forensic Voice Identification","author":"H. Hollicn","year":"2001","unstructured":"Hollicn, H.: Forensic Voice Identification. Academic Press, London (2001)"},{"key":"31_CR10","volume-title":"Conversational organization: Interaction between speakers and hearers","author":"C. Goodwin","year":"1981","unstructured":"Goodwin, C: Conversational organization: Interaction between speakers and hearers. Academic Press, New York (1981)"},{"key":"31_CR11","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1016\/S0167-4048(98)80005-8","volume":"3","author":"P. Landrock","year":"1998","unstructured":"Landrock, P., Pedersen, T.: WYSIWYS? What You Sec Is What You Sign? Information Security Technical Report, 3 (1998) 55\u201361","journal-title":"Information Security Technical Report"},{"key":"31_CR12","unstructured":"ISO: Information Technology: Security Frameworks for Open Systems: Non-Repudiation Framework. Technical Report ISO10181-4, ISO (1997)"},{"key":"31_CR13","unstructured":"ISO: Information Technology: Security Techniques \u2014 Non Repudiation \u2014 Part 1: General. Technical Report ISO13888-1, ISO (1997)"},{"key":"31_CR14","volume-title":"Mind, Language and Society","author":"J.R. Searle","year":"1999","unstructured":"Searle, J.R.: Mind, Language and Society. Basic Books, New York (1999)"},{"key":"31_CR15","volume-title":"How to Do Things with Words","author":"J.L. Austin","year":"1962","unstructured":"Austin, J.L.: How to Do Things with Words. Harvard University Press, Cambridge, Mass. (1962)"},{"key":"31_CR16","first-page":"153","volume":"24","author":"A.U. Schmidt","year":"2000","unstructured":"Schmidt, A.U.: Signiertes XML und das Pr\u00e4scntationsproblcm. Datenschutz und Datensicherheit 24 (2000) 153\u2013158","journal-title":"Datenschutz und Datensicherheit"},{"key":"31_CR17","unstructured":"Schmidt, A.U., Loebl, Z.: Legal security for transformations of signed documents: Fundamental concepts. In Chadwick, D., Zhao, G., eds.: EuroPKI 2005. Volume 3545 of Lecture Notes in Computer Science., Springer-Verlag (2005) 255\u2013270"},{"key":"31_CR18","unstructured":"Piechalski, J., Schmidt, A.U.: Authorised translations of electronic documents. In Venter, H.S., Eloff, J.H.P., Labuschagne, L., Eloff, M.M., eds.: Proceedings of the ISSA 2006 From Insight to Foresight Conference, Information Security South Africa (ISSA) (2006)"},{"key":"31_CR19","unstructured":"Rannenbcrg, K., Pfitzmann, A., M\u00fcller, G.: IT Security and Multilateral Security. In M\u00fcller, G., Rannenberg, K., eds.: Multilateral Security in Communications. Volume 3 of Technology, Infrastructure, Economy., Addison-Wesley (1999) 21\u201329"},{"key":"31_CR20","unstructured":"Rosenberg, J., et al.: SIP: Session Initiation Protocol. RFC 3261, IETF, June 2002. http:\/\/www.ietf.org\/rfc\/rfc3261.txt"},{"key":"31_CR21","unstructured":"Schulzrinne, H., et al.: RTP: A Transport Protocol for Real-Time Applications. RFC 1889, IETF, January 1996. http:\/\/www.ietf.org\/rfc\/rfcl889.txt"},{"key":"31_CR22","doi-asserted-by":"crossref","unstructured":"Adams, C, et al.: Internet X.509 Public Key Infrastructure Time-Stamp Protocol (TSP). RFC 3161, IETF, August 2001. http:\/\/www.ietf.org\/rfc\/rfc3161.txt","DOI":"10.17487\/rfc3161"},{"key":"31_CR23","doi-asserted-by":"crossref","first-page":"660","DOI":"10.4218\/etrij.06.0206.0047","volume":"28","author":"E.C. Choi","year":"2006","unstructured":"Choi, E.C., Huh, J.D., Kim, K.S., Cho, M.H.: Frame-size adaptive MAC protocol in high-rate wireless personal area networks. ETRI Journal 28 (2006) 660\u2013663","journal-title":"ETRI Journal"},{"key":"31_CR24","doi-asserted-by":"publisher","first-page":"375","DOI":"10.1109\/90.502236","volume":"4","author":"M. Shreedhar","year":"1996","unstructured":"Shreedhar, M., Varghese, G.: Efficient fair queuing using deficit round-robin. IEEE\/ACM Transactions on Networking 4 (1996) 375\u2013385","journal-title":"IEEE\/ACM Transactions on Networking"},{"key":"31_CR25","unstructured":"Hctt, Ch., Kuntze, N., Schmidt, A. U.: Security and non repudiation of Voiceover-IP conversations. To appear in: Proceedings of the Wireless World Research Forum (WWRF17), Heidelberg, Germany, 15\u201317 November 2006."},{"key":"31_CR26","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1109\/SECPRI.2000.848446","volume-title":"SP\u2019 00: Proceedings of the 2000 IEEE Symposium on Security and Privacy","author":"A. Perrig","year":"2000","unstructured":"Perrig, A., Tygar, J.D., Song, D., Canetti, R.: Efficient authentication and signing of multicast streams over lossy channels. In: SP\u2019 00: Proceedings of the 2000 IEEE Symposium on Security and Privacy, Washington, DC, USA, IEEE Computer Society (2000) 56\u201375"},{"key":"31_CR27","unstructured":"Hett, C, Kuntze, N., Schmidt, A.U.: A secure archive for Voice-ovcr-IP conversations. In et al., D.S., ed.: To appear in the Proceedings of the 3rd Annual VoIP Security Workshop (VSW06), ACM (2006) http:\/\/www.arxiv.org\/abs\/cs.CR\/0606032"},{"key":"31_CR28","unstructured":"Telecoms & Internet converged Services & Protocols for Advanced Networks (TISPAN) http:\/\/www.tispan.org , sec also the Whitepaper http:\/\/www.newport-networks.com\/cust-docs\/91-IPSec-and-VoIP.pdf"},{"key":"31_CR29","doi-asserted-by":"crossref","unstructured":"Z\u00fchlke, M., K\u00f6nig, H.: A signaling protocol for small closed dynamic multi-peer groups. In: Proceedings of High Speed Networks and Multimedia Communications, 7th IEEE International Conference (HSNMC 2004), Toulouse, France. Volume 3079 of LNCS., Springer-Verlag (2004) 973\u2013984","DOI":"10.1007\/978-3-540-25969-5_91"},{"key":"31_CR30","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1109\/65.730750","volume":"12","author":"C. Perkins","year":"1998","unstructured":"Perkins, C, Hodson, O., Hardman, V.: A survey of packet loss recovery techniques for streaming audio. IEEE Network 12 (1998) 40\u201348","journal-title":"IEEE Network"},{"key":"31_CR31","unstructured":"Zhu, Q.F., Kerofsky, L.: Joint source coding, transport processing, and error concealment for H.323-bascd packet video. In Aizawa, K., Stevenson, R.L., Zhang, Y.Q., eds.: Visual Communications and Image Processing\u2019 99. Volume i3653 of Proceedings of SPIE., SPIE (1998) 52\u201362"},{"key":"31_CR32","doi-asserted-by":"publisher","first-page":"1891","DOI":"10.1016\/S0169-7552(96)00089-X","volume":"28","author":"S. Kollctzki","year":"1996","unstructured":"Kollctzki, S.: Secure internet banking with privacy enhanced mail \u2014 a protocol for reliable exchange of secured order forms. Computer Networks and ISDN Systems 28 (1996) 1891\u20131899","journal-title":"Computer Networks and ISDN Systems"},{"key":"31_CR33","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1016\/S1389-1286(01)00214-6","volume":"37","author":"R. Grimm","year":"2001","unstructured":"Grimm, R., Ochsenschl\u00e4ger, P.: Binding Cooperation. A Formal Model for Electronic Commerce. Computer Networks 37 (2001) 171\u2013193","journal-title":"Computer Networks"}],"container-title":["IFIP International Federation for Information Processing","New Approaches for Security, Privacy and Trust in Complex Environments"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-0-387-72367-9_31","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,4]],"date-time":"2019-05-04T04:58:54Z","timestamp":1556945934000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-0-387-72367-9_31"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007]]},"ISBN":["9780387723662","9780387723679"],"references-count":33,"URL":"https:\/\/doi.org\/10.1007\/978-0-387-72367-9_31","relation":{},"ISSN":["1571-5736"],"issn-type":[{"type":"print","value":"1571-5736"}],"subject":[],"published":{"date-parts":[[2007]]}}}