{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,4]],"date-time":"2025-04-04T10:06:27Z","timestamp":1743761187161,"version":"3.28.0"},"reference-count":20,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,6,1]],"date-time":"2021-06-01T00:00:00Z","timestamp":1622505600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,6,1]],"date-time":"2021-06-01T00:00:00Z","timestamp":1622505600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,6]]},"DOI":"10.1109\/icc42927.2021.9500888","type":"proceedings-article","created":{"date-parts":[[2021,8,6]],"date-time":"2021-08-06T16:49:21Z","timestamp":1628268561000},"page":"1-6","source":"Crossref","is-referenced-by-count":3,"title":["Building a Secure Video Conference System with Customized Cryptographic USB Keys"],"prefix":"10.1109","author":[{"given":"Pengyi","family":"Wu","sequence":"first","affiliation":[{"name":"Chinese Academy of Sciences,State Key Laboratory of Information Security, Institute of Information Engineering,Beijing,China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Quanwei","family":"Cai","sequence":"additional","affiliation":[{"name":"Chinese Academy of Sciences,State Key Laboratory of Information Security, Institute of Information Engineering,Beijing,China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Qiongxiao","family":"Wang","sequence":"additional","affiliation":[{"name":"Chinese Academy of Sciences,State Key Laboratory of Information Security, Institute of Information Engineering,Beijing,China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Hongjin","family":"Cao","sequence":"additional","affiliation":[{"name":"Tencent Technology (Beijing) Co., Ltd,Beijing,China"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"year":"2020","key":"ref10","article-title":"SCSI primary commands - 6 (spc-6), revision 1"},{"year":"2000","key":"ref11","article-title":"Universal serial bus specification revision 2.0"},{"year":"2019","key":"ref12","article-title":"FIPS 140-3security requirements for cryptographic modules"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2008.4712098"},{"key":"ref14","first-page":"416","article-title":"Encryption and watermarking embedded in h.264\/avc video stream","volume":"5","author":"sowmya keerthi","year":"2016","journal-title":"International Journal of Advanced Research in Computer and Communication Engineering"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2015.2511879"},{"key":"ref16","first-page":"41","article-title":"An H.264 video encryption algorithm based on entropy coding","author":"cai","year":"2007","journal-title":"3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP)"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2015.7389804"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2016.7613195"},{"key":"ref19","doi-asserted-by":"crossref","first-page":"30","DOI":"10.1109\/TCE.2014.6780922","article-title":"Enhanced three-factor security protocol for consumer USB mass storage devices","volume":"60","author":"he","year":"2014","journal-title":"IEEE Trans Consumer Electronics"},{"key":"ref4","first-page":"45","article-title":"Lest we remember: Cold boot attacks on encryption keys","author":"halderman","year":"2008","journal-title":"Proceedings of the 17th USENIX Security Symposium"},{"year":"0","key":"ref3","article-title":"Openssl heartbleed"},{"key":"ref6","first-page":"533","article-title":"simtpm: User-centric TPM for mobile devices","author":"chakraborty","year":"2019","journal-title":"28th USENIX Security Symposium USENIX Security 2019"},{"key":"ref5","article-title":"TRESOR runs encryption securely outside RAM","author":"m\u00fcller","year":"2011","journal-title":"Proceedings of 20th USENIX Security Symposium"},{"year":"2018","key":"ref8","article-title":"The transport layer security (TLS) protocol version 1.3"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2603974"},{"year":"2020","key":"ref2"},{"key":"ref1","first-page":"20","article-title":"and Mosab I Tabash. Encryption techniques for H.264\/AVC videos: A literature review","volume":"45","author":"tabash","year":"2019","journal-title":"J Inf Secur Appl"},{"year":"2010","key":"ref9","article-title":"Universal serial bus mass storage class specification overview revision 1.4"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866419"}],"event":{"name":"ICC 2021 - IEEE International Conference on Communications","start":{"date-parts":[[2021,6,14]]},"location":"Montreal, QC, Canada","end":{"date-parts":[[2021,6,23]]}},"container-title":["ICC 2021 - IEEE International Conference on Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9500243\/9500244\/09500888.pdf?arnumber=9500888","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,2]],"date-time":"2022-08-02T20:07:24Z","timestamp":1659470844000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9500888\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,6]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/icc42927.2021.9500888","relation":{},"subject":[],"published":{"date-parts":[[2021,6]]}}}