{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T21:55:55Z","timestamp":1729634155571,"version":"3.28.0"},"reference-count":31,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,3]]},"DOI":"10.1109\/ssd.2016.7473737","type":"proceedings-article","created":{"date-parts":[[2016,5,20]],"date-time":"2016-05-20T07:52:03Z","timestamp":1463730723000},"page":"171-176","source":"Crossref","is-referenced-by-count":1,"title":["Building IPv6 based tunneling mechanisms for VoIP security"],"prefix":"10.1109","author":[{"given":"Amzari J.","family":"Ghazali","sequence":"first","affiliation":[]},{"given":"Waleed","family":"Al-Nuaimy","sequence":"additional","affiliation":[]},{"given":"Ali","family":"Al-Ataby","sequence":"additional","affiliation":[]},{"given":"Majid A.","family":"Al-Taee","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref31","first-page":"1","article-title":"Quality of experience analysis of videoconferencing over lossy networks","author":"murshid","year":"2013","journal-title":"Proc IEEE Jordan Conf on Applied Electrical Engineering and Computing Technologies"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/CCECE.2006.277417"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2007.256"},{"key":"ref11","first-page":"33","article-title":"A Study of Encryption Algorithms AES, DES and RSA for Security","volume":"13","author":"mahajan","year":"2013","journal-title":"Int J Computer Applications"},{"key":"ref12","first-page":"201","article-title":"Biometric-based security system for plaintext email messages","author":"al-taee","year":"2009","journal-title":"Proc Int Conf on Developments in e-Systems Engineering"},{"key":"ref13","article-title":"Multilevel encryption of plaintext messages using a smart card connected to PC parallel port","author":"qasrawi","year":"2009","journal-title":"3rd Int Conf Modeling Simulation and Applied Optimization"},{"year":"0","key":"ref14"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/NPC.2007.50"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICCSIT.2010.5564141"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ICSPS.2010.5555209"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ICACT.2006.206059"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/AICCSA.2009.5069388"},{"key":"ref28","first-page":"129","article-title":"Impact of TCP window size on IPv4 and IPv6 performance","volume":"9","author":"sailan","year":"2009","journal-title":"Int J of Computer Science and Network Security"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/IWMN.2013.6663789"},{"year":"0","key":"ref27"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"11","DOI":"10.1109\/ICNS.2006.66","article-title":"IPv6 &#x2014; An opportunity for new service and network features","author":"tufail","year":"2006","journal-title":"Proc IEEE Int Conf on Networking and Services"},{"key":"ref6","first-page":"15","article-title":"VoIP performance with IPsec in IPv4-IPv6 transition networks","volume":"lxv","author":"asinovskyy","year":"2010","journal-title":"Inforcommunication Journal"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.3923\/itj.2011.446.451"},{"key":"ref5","first-page":"427","article-title":"A comparative review of IPv4 and IPv6 for research testbed","author":"sailan","year":"2009","journal-title":"Proc Int Conf on Electrical Engineering and Informatics"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICIMTR.2012.6236400"},{"key":"ref7","first-page":"235","article-title":"Impact of IPsec and 6to4 on VoIP quality over IPv 6","author":"yasinovskyy","year":"2009","journal-title":"Proc 10th Int Conf Telecommun"},{"journal-title":"Computer Networks","year":"2011","author":"tanenbaum","key":"ref2"},{"key":"ref9","first-page":"25","article-title":"Analysis of IPSec overheads for VPN servers","author":"shue","year":"2006","journal-title":"Proceedings of IEEE ICNP Workshop on Secure Network Protocols"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ICTEL.2003.1191589"},{"key":"ref20","first-page":"161","article-title":"Evaluating voice speech quality in networks with VPN\/IPSec","author":"passito","year":"2005","journal-title":"Proc IEEE 17th Malaysia int Conf on Networks\/Communication"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/CODEC.2012.6509361"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.2002.1176297"},{"year":"0","key":"ref24"},{"year":"0","key":"ref23"},{"year":"0","key":"ref26"},{"year":"0","key":"ref25"}],"event":{"name":"2016 13th International Multi-Conference on Systems, Signals & Devices (SSD)","start":{"date-parts":[[2016,3,21]]},"location":"Leipzig, Germany","end":{"date-parts":[[2016,3,24]]}},"container-title":["2016 13th International Multi-Conference on Systems, Signals &amp; Devices (SSD)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7465653\/7473648\/07473737.pdf?arnumber=7473737","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,8]],"date-time":"2019-09-08T03:01:13Z","timestamp":1567911673000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7473737\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,3]]},"references-count":31,"URL":"https:\/\/doi.org\/10.1109\/ssd.2016.7473737","relation":{},"subject":[],"published":{"date-parts":[[2016,3]]}}}