{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T16:19:18Z","timestamp":1730305158193,"version":"3.28.0"},"reference-count":13,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008,11]]},"DOI":"10.1109\/wd.2008.4812920","type":"proceedings-article","created":{"date-parts":[[2009,4,10]],"date-time":"2009-04-10T19:39:42Z","timestamp":1239392382000},"page":"1-5","source":"Crossref","is-referenced-by-count":7,"title":["Using SIP identity to prevent man-in-the-middle attacks on ZRTP"],"prefix":"10.1109","author":[{"given":"Oliver","family":"Jung","sequence":"first","affiliation":[]},{"given":"Martin","family":"Petraschek","sequence":"additional","affiliation":[]},{"given":"Thomas","family":"Hoeher","sequence":"additional","affiliation":[]},{"given":"Ivan","family":"Gojmerac","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"year":"1999","key":"13","article-title":"information technology security techniques key management - part 3: mechanisms using asymmetric techniques"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.17487\/rfc3526"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/WD.2008.4812920"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.17487\/rfc4474"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1976.1055638"},{"journal-title":"ZRTP Media Path Key Agreement for Secure RTP","year":"2008","author":"zimmermann","key":"1"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.17487\/rfc4347"},{"year":"0","key":"7"},{"journal-title":"Proceedings of the 68th Internet Engineering Task Force","article-title":"rtpsec minutes","year":"2007","key":"6"},{"key":"5","first-page":"1","article-title":"ten risks of pki: what you're not being told about public-key infrastructure","volume":"16","author":"ellison","year":"2000","journal-title":"Computers & Security"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.17487\/rfc3711"},{"journal-title":"Datagram Transport Layer Security (DTLS) Extension to Establish Keys for Secure Real-time Transport Protocol (SRTP)","year":"2008","author":"mcgrew","key":"9"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.17487\/rfc3830"}],"event":{"name":"2008 1st IFIP Wireless Days (WD)","start":{"date-parts":[[2008,11,24]]},"location":"Dubai, United Arab Emirates","end":{"date-parts":[[2008,11,27]]}},"container-title":["2008 1st IFIP Wireless Days"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4808202\/4812823\/04812920.pdf?arnumber=4812920","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,17]],"date-time":"2017-03-17T19:17:44Z","timestamp":1489778264000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4812920\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,11]]},"references-count":13,"URL":"https:\/\/doi.org\/10.1109\/wd.2008.4812920","relation":{},"subject":[],"published":{"date-parts":[[2008,11]]}}}