{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T15:12:37Z","timestamp":1730301157545,"version":"3.28.0"},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,7]]},"DOI":"10.1109\/tsp.2018.8441204","type":"proceedings-article","created":{"date-parts":[[2018,8,23]],"date-time":"2018-08-23T18:08:21Z","timestamp":1535047701000},"page":"1-5","source":"Crossref","is-referenced-by-count":8,"title":["Secure End-to-End VoLTE Based on Ethereum Blockchain"],"prefix":"10.1109","author":[{"given":"Elie F.","family":"Kfoury","sequence":"first","affiliation":[]},{"given":"David J.","family":"Khoury","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"Ethereum white paper","author":"buterin","year":"2013","journal-title":"Github Repository"},{"key":"ref11","first-page":"1","article-title":"Ethereum: A secure decentralised generalised transaction ledger","volume":"151","author":"wood","year":"2014","journal-title":"Ethereum Project Yellow Paper"},{"key":"ref12","article-title":"Digital signature system and method based on a conventional encryption function","author":"merkle","year":"1989","journal-title":"US Patent"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"154","DOI":"10.1007\/3-540-49162-7_12","article-title":"Unknown key-share attacks on the station-to-station (sts) protocol","author":"blake-wilson","year":"1999","journal-title":"Workshop on Public Key Cryptography"},{"key":"ref14","article-title":"Secure end-to-end VoIP based on Ethereum Blockchain","author":"kfoury","year":"0","journal-title":"Journal of Communications - PREPRINT"},{"journal-title":"A special report analysing the 2016 data","year":"0","key":"ref15"},{"journal-title":"IMS Profile for Voice and SMS","article-title":"GSMA","year":"0","key":"ref4"},{"key":"ref3","first-page":"9v","article-title":"IP Multimedia Subsystem. media plane security (3gpp ts 33.328 version 9.2. 0 release 9)","volume":"133","year":"2010","journal-title":"ETSI TS"},{"key":"ref6","article-title":"Rtp","author":"jacobson","year":"2003","journal-title":"A transport protocol for real-time applications"},{"journal-title":"VoLTE Service Description and Implementation Guidelines","year":"2017","key":"ref5"},{"key":"ref8","first-page":"147","article-title":"Breaking and fixing the needham-schroeder public-key protocol using fdr","author":"lowe","year":"1996","journal-title":"International Workshop on Tools and Algorithms for the Construction and Analysis of Systems"},{"journal-title":"Light client protocol ethereum\/wiki wiki github","year":"0","key":"ref7"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.17487\/rfc3261"},{"journal-title":"3GPP TS 23 228","article-title":"IP Multimedia Subsystem. stage 2","year":"2006","key":"ref1"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4842-2535-6"}],"event":{"name":"2018 41st International Conference on Telecommunications and Signal Processing (TSP)","start":{"date-parts":[[2018,7,4]]},"location":"Athens","end":{"date-parts":[[2018,7,6]]}},"container-title":["2018 41st International Conference on Telecommunications and Signal Processing (TSP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8419443\/8441166\/08441204.pdf?arnumber=8441204","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T09:48:21Z","timestamp":1643190501000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8441204\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,7]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/tsp.2018.8441204","relation":{},"subject":[],"published":{"date-parts":[[2018,7]]}}}