{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,9,13]],"date-time":"2023-09-13T19:36:40Z","timestamp":1694633800851},"reference-count":16,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"5","license":[{"start":{"date-parts":[[2008,9,1]],"date-time":"2008-09-01T00:00:00Z","timestamp":1220227200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Network"],"published-print":{"date-parts":[[2008,9]]},"DOI":"10.1109\/mnet.2008.4626230","type":"journal-article","created":{"date-parts":[[2008,9,24]],"date-time":"2008-09-24T18:00:11Z","timestamp":1222279211000},"page":"33-40","source":"Crossref","is-referenced-by-count":2,"title":["Distributed connectivity service for a SIP infrastructure"],"prefix":"10.1109","volume":"22","author":[{"given":"L.","family":"Ciminiera","sequence":"first","affiliation":[]},{"given":"G.","family":"Marchetto","sequence":"additional","affiliation":[]},{"given":"F.","family":"Risso","sequence":"additional","affiliation":[]},{"given":"L.","family":"Torrero","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"Silver Needle in the Skype","author":"biondi","year":"2006","journal-title":"Black Hat Europe 2006"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1103\/RevModPhys.74.47"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.64.046135"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2006.1705882"},{"key":"ref14","author":"jennings","year":"2008","journal-title":"Resource location and discovery (reload)"},{"key":"ref15","article-title":"Peering through the Shroud: The Effect of Edge Opacity on IP-Based Client Identification","author":"casado","year":"2007","journal-title":"1st USENIX\/ACM Symp Networked Sys Design and Implementation"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/863955.864000"},{"key":"ref4","author":"rosenberg","year":"2008","journal-title":"Interactive Connectivity Establishment (ICE) A Protocol for NAT Traversal for Offer\/Answer Protocols"},{"key":"ref3","year":"2007","journal-title":"Managing Client Initiated Connections in SIP"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.17487\/rfc5389"},{"key":"ref5","author":"rosenberg","year":"2008","journal-title":"Traversal Using Relays around NAT (TURN) Relay Extensions to Session Traversal Utilities for NAT (STUN)"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/1229899.1229910"},{"key":"ref7","author":"macdonald","year":"2008","journal-title":"NAT Behavior Discovery Using STUN"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.17487\/rfc3261"},{"key":"ref1","article-title":"Peer-to-Peer Communication across Network Address Translators","author":"ford","year":"2005","journal-title":"USENIX Annual Tech Conf"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2006.312"}],"container-title":["IEEE Network"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/65\/4626220\/04626230.pdf?arnumber=4626230","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T16:18:46Z","timestamp":1642004326000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4626230\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,9]]},"references-count":16,"journal-issue":{"issue":"5"},"URL":"https:\/\/doi.org\/10.1109\/mnet.2008.4626230","relation":{},"ISSN":["0890-8044"],"issn-type":[{"value":"0890-8044","type":"print"}],"subject":[],"published":{"date-parts":[[2008,9]]}}}