{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T07:03:24Z","timestamp":1725519804731},"publisher-location":"Berlin, Heidelberg","reference-count":24,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540890539"},{"type":"electronic","value":"9783540890546"}],"license":[{"start":{"date-parts":[[2008,1,1]],"date-time":"2008-01-01T00:00:00Z","timestamp":1199145600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008]]},"DOI":"10.1007\/978-3-540-89054-6_11","type":"book-chapter","created":{"date-parts":[[2008,10,22]],"date-time":"2008-10-22T10:34:17Z","timestamp":1224671657000},"page":"217-235","source":"Crossref","is-referenced-by-count":8,"title":["Lawful Interception in P2P-Based VoIP Systems"],"prefix":"10.1007","author":[{"given":"Jan","family":"Seedorf","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"11_CR1","unstructured":"American National Standards Institute: Lawfully Authorized Electronic Surveillance (LAES) for Voice over Packet Technologies in Wireline Telecommunications networks, ATIS-1000678.200X (ANS T1.678), Version 2. Draft (proposed)"},{"key":"11_CR2","unstructured":"Baset, S.: P2PP prototype implementation, http:\/\/www1.cs.columbia.edu\/~salman\/peer\/"},{"key":"11_CR3","doi-asserted-by":"crossref","unstructured":"Baumgart, I.: P2PNS: A Secure Distributed Name Service for P2PSIP. In: Proceedings of the 5th IEEE International Workshop on Mobile Peer-to-Peer Computing (MP2P 2008) in conjunction with IEEE PerCom 2008, Hong Kong, China, pp. 480\u2013485 (March 2008)","DOI":"10.1109\/PERCOM.2008.91"},{"key":"11_CR4","unstructured":"Bellovin, S., Blaze, M., Brickell, E., Brooks, C., Cerf, V., Diffie, W., Landau, S., Peterson, J., Treichler, J.: Security Implications of Applying the Communications Assistance to Law Enforcement Act to Voice over IP, http:\/\/www.itaa.org\/news\/docs\/CALEAVOIPreport.pdf"},{"key":"11_CR5","unstructured":"Bryan, D.A., Lowekamp, B.B., Jennings, C.: SOSIMPLE: A Serverless, Standards-based, P2P SIP Communication System. In: Proceedings of the International Workshop on Advanced Architectures and Algorithms for Internet Delivery and Applications, Orlando, USA (June 2005)"},{"key":"11_CR6","unstructured":"Cable Television Laboratories: PacketCable Electronic Surveillance Specification, PKT-SP-ESP-104-040723 (July 2004)"},{"key":"11_CR7","volume-title":"Proc. of the 5th Symposium on Operating Systems Design and Implementation","author":"M. Castro","year":"2002","unstructured":"Castro, M., Druschel, P., Ganesh, A., Rowstron, A., Wallach, D.S.: Secure routing for structured peer-to-peer overlay networks. In: Proc. of the 5th Symposium on Operating Systems Design and Implementation, Boston, MA. ACM Press, New York (December 2002)"},{"key":"11_CR8","unstructured":"ETSI: ETSI Lawful Interception Architecture, ETSI TS 102 528 v1.1.1 Lawful Interception (LI), Interception domain Architecture for IP networks, technical specification (November 2006)"},{"key":"11_CR9","unstructured":"International Herald Tribune Europe: German minister defends \u2019Trojan horse\u2019 spy tactic as needed to fight terror, http:\/\/www.iht.com\/articles\/ap\/2007\/08\/31\/europe\/EU-GEN-Germany-Trojan-Horses.php"},{"key":"11_CR10","unstructured":"Jennings, C., Lowekamp, B., Rescorla, E., Rosenberg, J., Baset, S., Schulzrinne, H.: REsource LOcation And Discovery (RELOAD), internet draft (draft-bryan-p2psip-reload-03) (work in progress) (February 2008)"},{"key":"11_CR11","unstructured":"P2PSIP Status Pages:Peer-to-Peer Session Initiation Protocol (Active WG), http:\/\/tools.ietf.org\/wg\/p2psip\/"},{"key":"11_CR12","unstructured":"Rappu, I.: Lawful Interception of VoIP in SIP-based Networks, Project Work, Technical-University Hamburg-Harburg (TUHH) (May 2007)"},{"key":"11_CR13","doi-asserted-by":"crossref","unstructured":"Ratnasamy, S., Francis, P., Handley, M., Karp, R., Shenker, S.: A Scalable Content-Addressable Network. In: Proc. of SIGCOMM 2001, San Diego, USA, August 27-31 (2001)","DOI":"10.1145\/383059.383072"},{"key":"11_CR14","doi-asserted-by":"crossref","unstructured":"Rosenberg, J., Schulzrinne, H., Camarillo, G., Johnston, A., Peterson, J., Sparks, R., Handley, M., Schooler, E.: SIP: Session Initiation Protocol, RFC 3261 (June 2002), http:\/\/www.ietf.org\/rfc\/rfc3261.txt","DOI":"10.17487\/rfc3261"},{"key":"11_CR15","doi-asserted-by":"publisher","first-page":"329","DOI":"10.1007\/3-540-45518-3_18","volume-title":"Middleware 2001","author":"A. Rowstron","year":"2001","unstructured":"Rowstron, A., Druschel, P.: Pastry: Scalable, decentralized object location and routing for large-scale peer-to-peer systems. In: Guerraoui, R. (ed.) Middleware 2001, vol.\u00a02218, pp. 329\u2013350. Springer, Heidelberg (2001)"},{"issue":"5","key":"11_CR16","first-page":"38","volume":"20","author":"J. Seedorf","year":"2006","unstructured":"Seedorf, J.: Security Challenges for P2P-SIP. IEEE Network Special Issue on Securing Voice over IP\u00a020(5), 38\u201345 (2006)","journal-title":"IEEE Network Special Issue on Securing Voice over IP"},{"key":"11_CR17","unstructured":"Seedorf, J.: Using Cryptographically Generated SIP-URIs to Protect the Integrity of Content in P2P-SIP. In: 3rd Annual VoIP Security Workshop, Berlin, Germany (June 2006)"},{"key":"11_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-79966-5_6","volume-title":"Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks","author":"J. Seedorf","year":"2008","unstructured":"Seedorf, J., Muus, C.: Availability for DHT-based Overlay Networks with Unidirectional Routing. In: Onieva, J.A., Sauveron, D., Chaumette, S., Gollmann, D., Markantonakis, K. (eds.) WISTP 2008. LNCS, vol.\u00a05019. Springer, Heidelberg (2008)"},{"key":"11_CR19","doi-asserted-by":"crossref","unstructured":"Singh, A., Castro, M., Druschel, P., Rowstron, A.: Defending against eclipse attacks on overlay networks. In: Proc. of the ACM SIGOPS European Workshop (September 2004)","DOI":"10.1145\/1133572.1133613"},{"key":"11_CR20","doi-asserted-by":"crossref","unstructured":"Singh, K., Schulzrinne, H.: Peer-to-Peer Internet Telephony using SIP. In: Proc. of the international workshop on Network and operating systems support for digital audio and video, Stevenson, Washington, USA, pp. 63\u201368 (2005)","DOI":"10.1145\/1065983.1065999"},{"key":"11_CR21","unstructured":"SIPDHT, http:\/\/sipdht.sourceforge.net"},{"key":"11_CR22","doi-asserted-by":"crossref","unstructured":"Sharp, C., Baker, F., Foster, B.: Cisco Architecture for Lawful Intercept in IP Networks, RFC 3924 (October 2004)","DOI":"10.17487\/rfc3924"},{"key":"11_CR23","doi-asserted-by":"crossref","unstructured":"Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: A Scalable Peer-to-Peer Lookup Protocol for Internet Applications. IEEE\/ACM Transactions on Networking\u00a011(1) (February 2003)","DOI":"10.1109\/TNET.2002.808407"},{"key":"11_CR24","doi-asserted-by":"crossref","unstructured":"Zhao, B.Y., Huang, L., Stribling, J., Rhea, S.C., Joseph, A.D., Kubiatowicz, J.: Tapestry: A Resilient Global-Scale Overlay for Service Deployment. IEEE Journal on Selected Areas in Communications\u00a022(1) (January 2004)","DOI":"10.1109\/JSAC.2003.818784"}],"container-title":["Lecture Notes in Computer Science","Principles, Systems and Applications of IP Telecommunications. Services and Security for Next Generation Networks"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-89054-6_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,14]],"date-time":"2019-05-14T17:13:35Z","timestamp":1557854015000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-89054-6_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008]]},"ISBN":["9783540890539","9783540890546"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-89054-6_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2008]]}}}