{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,18]],"date-time":"2025-10-18T10:41:35Z","timestamp":1760784095860,"version":"3.40.3"},"publisher-location":"Cham","reference-count":19,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319288642"},{"type":"electronic","value":"9783319288659"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-28865-9_43","type":"book-chapter","created":{"date-parts":[[2016,1,23]],"date-time":"2016-01-23T03:40:02Z","timestamp":1453520402000},"page":"649-664","source":"Crossref","is-referenced-by-count":14,"title":["A Secure Cross-Domain SIP Solution for Mobile Ad Hoc Network Using Dynamic Clustering"],"prefix":"10.1007","author":[{"given":"Ala\u2018","family":"Aburumman","sequence":"first","affiliation":[]},{"given":"Wei Jye","family":"Seo","sequence":"additional","affiliation":[]},{"given":"Rafiqul","family":"Islam","sequence":"additional","affiliation":[]},{"given":"Muhammad Khurram","family":"Khan","sequence":"additional","affiliation":[]},{"given":"Kim-Kwang Raymond","family":"Choo","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"43_CR1","unstructured":"Garber, M.: Securing Session Initiation Protocol Over Ad Hoc Network, Master Thesis, Institute for Pervasive Computing, Zurich (2005)"},{"key":"43_CR2","doi-asserted-by":"crossref","unstructured":"Basagni, S., Conti, M., Giordano, S., Stojmenovic, I.: Mobile Ad Hoc Networking. IEEE Press and A John Wiley & Sons Inc. (2004)","DOI":"10.1002\/0471656895"},{"key":"43_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1007\/978-3-540-76778-7_4","volume-title":"Middleware 2007","author":"G Alonso","year":"2007","unstructured":"Alonso, G., Remund, A., Stuedi, P., Bihr, M.: SIPHoc: efficient SIP middleware for ad hoc networks. In: Cerqueira, R., Campbell, R.H. (eds.) Middleware 2007. LNCS, vol. 4834, pp. 60\u201379. Springer, Heidelberg (2007)"},{"key":"43_CR4","doi-asserted-by":"crossref","unstructured":"Rosenberg, J., Schulzrinne, H., Camarillo, G., Johnston, A., Peterson, J., Sparks, R., Handley, M., Schooler, E.: SIP: session initiation protocol, RFC 3261, IETF (2002)","DOI":"10.17487\/rfc3261"},{"issue":"2","key":"43_CR5","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1145\/1229899.1229909","volume":"5","author":"R Sparks","year":"2007","unstructured":"Sparks, R.: SIP Basics and Beyond, Estacado Systems. ACM Queue 5(2), 22\u201333 (2007)","journal-title":"ACM Queue"},{"key":"43_CR6","doi-asserted-by":"crossref","unstructured":"Arkko, J., Torvinen, V., Camarillo, G., Niemi, A., Haukka, T.: Security Mechanism Agreement for the Session Initiation Protocol (SIP), RFC 3329, IETF (2003)","DOI":"10.17487\/rfc3329"},{"key":"43_CR7","unstructured":"Leggio, S., Manner, J., Hulkkonen, A., Raatikainen, K.: Session initiation protocol deployment in ad-hoc networks: a decentralized approach. In: Proceedings of 2nd International Workshop on Wireless Ad-hoc Networks (IWWAN) (2005)"},{"key":"43_CR8","doi-asserted-by":"crossref","unstructured":"Bai, Y., Aminullah, S., Han, Q., Wang, D., Zhang, T., Qian, D.: A novel distributed wireless VoIP server based on SIP. In: Proceedings of International Conference on Multimedia and Ubiquitous Engineering (MUE 2007), pp. 958\u2013962. IEEE (2007)","DOI":"10.1109\/MUE.2007.37"},{"key":"43_CR9","unstructured":"Bah, S.: SIP servlets-based service provisioning in MANETs, Concordia University (2010)"},{"key":"43_CR10","doi-asserted-by":"crossref","unstructured":"Kagoshima, T., Kasamatsu, D., Takami, K.: Architecture and emulator in ad hoc network for providing P2P type SIP_VoIP services. In: Proceedings of IEEE Region 10 Conference (TENCON 2011), pp. 164\u2013168. IEEE (2011)","DOI":"10.1109\/TENCON.2011.6129084"},{"key":"43_CR11","unstructured":"Alshingiti, M.: Security Enhancement for SIP in Ad Hoc Networks, Carleton University (2012)"},{"key":"43_CR12","doi-asserted-by":"crossref","unstructured":"Leggio, S., Miranda, H., Raatikainen, K., Rodrigues, L.: SIPCache: a distributed SIP location service for mobile ad-hoc networks. In: Proceedings of Annual International Conference on Mobile and Ubiquitous Systems: Networking & Services (MobiQuitous 2006), pp. 1\u20134. IEEE (2006)","DOI":"10.1109\/MOBIQ.2006.340392"},{"key":"43_CR13","unstructured":"Aburumman, A., Choo, K.-K.R., Lee, I.: Nomination-based session initiation protocol service for mobile ad hoc networks. In: Proceedings of 22nd National Conference of the Australian Society for Operations Research (ASOR 2013), pp. 149\u2013155. The Australian Society for Operations Research (2013)"},{"key":"43_CR14","doi-asserted-by":"crossref","unstructured":"Abdullah, L., Almomani, I., Aburumman, A.: Secure cluster-based SIP service over Ad hoc networks. In: Proceedings of IEEE Jordan Conference on Applied Electrical Engineering and Computing Technologies (AEECT 2013), pp. 1\u20137. IEEE (2013)","DOI":"10.1109\/AEECT.2013.6716449"},{"key":"43_CR15","doi-asserted-by":"crossref","unstructured":"Almobaideen, W., Kubba, N., Awajan, A.W.: FCSIP: fuzzy and cluster based SIP protocol for MANET. In: Proceedings of International Conference on Next Generation Mobile Apps, Services and Technologies (NGMAST 2014), pp. 169\u2013174. IEEE (2014)","DOI":"10.1109\/NGMAST.2014.37"},{"key":"43_CR16","doi-asserted-by":"crossref","unstructured":"Aburumman, A., Choo, K.-K.R.: A domain-based multi-cluster SIP solution for mobile ad hoc network. In: Proceedings of International ICST Conference on Security and Privacy in Communication Networks (SecureComm 2014). Springer (2015)","DOI":"10.1007\/978-3-319-23802-9_21"},{"key":"43_CR17","unstructured":"Azfar, A., Choo, K.-K.R., Liu, L.: Android mobile VoIP apps: A survey and examination of their security and privacy, Electronic Commerce Research (In press)"},{"key":"43_CR18","doi-asserted-by":"crossref","unstructured":"Azfar, A., Choo, K.-K.R., Liu, L.: A study of ten popular Android mobile VoIP applications: are the communications encrypted? In: Proceedings of Annual Hawaii International Conference on System Sciences (HICSS 2014), pp. 4858\u20134867. IEEE (2014)","DOI":"10.1109\/HICSS.2014.596"},{"issue":"12","key":"43_CR19","doi-asserted-by":"publisher","first-page":"1347","DOI":"10.1080\/0144929X.2014.934286","volume":"33","author":"J Imgraben","year":"2014","unstructured":"Imgraben, J., Engelbrecht, A., Choo, K.-K.R.: Always connected, but are smart mobile users getting more security savvy? A survey of smart mobile device users, Behaviour & Information Technology 33(12), 1347\u20131360 (2014)","journal-title":"A survey of smart mobile device users, Behaviour & Information Technology"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Security and Privacy in Communication Networks"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-28865-9_43","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T07:27:44Z","timestamp":1559374064000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-28865-9_43"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319288642","9783319288659"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-28865-9_43","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2015]]}}}