{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:40:10Z","timestamp":1750308010610,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":25,"publisher":"ACM","license":[{"start":{"date-parts":[[2006,7,3]],"date-time":"2006-07-03T00:00:00Z","timestamp":1151884800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2006,7,3]]},"DOI":"10.1145\/1143549.1143622","type":"proceedings-article","created":{"date-parts":[[2007,1,17]],"date-time":"2007-01-17T01:15:56Z","timestamp":1168996556000},"page":"367-372","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Simple voice security protocol"],"prefix":"10.1145","author":[{"given":"Carole","family":"Bassil","sequence":"first","affiliation":[{"name":"ENST, Paris, France"}]},{"given":"Ahmed","family":"Serhrouchni","sequence":"additional","affiliation":[{"name":"ENST, Paris, France"}]},{"given":"Nicolas","family":"Rouhana","sequence":"additional","affiliation":[{"name":"Saint Joseph University, Beirut, Lebanon"}]}],"member":"320","published-online":{"date-parts":[[2006,7,3]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"IETF RFC 2401 -","author":"Kent S.","year":"1998","unstructured":"S. Kent , R. Atkinson , \" Security Architecture for the Internet Protocol\" , IETF RFC 2401 - Nov. 1998 ]] S. Kent, R. Atkinson, \"Security Architecture for the Internet Protocol\", IETF RFC 2401 - Nov. 1998]]"},{"key":"e_1_3_2_1_2_1","unstructured":"General Dynamics \"FNBDT Signaling Plan Revision 1.1\" National Security Agency 01 Sept.1999]]  General Dynamics \"FNBDT Signaling Plan Revision 1.1\" National Security Agency 01 Sept.1999]]"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"crossref","unstructured":"M. Baugher & al. \"The Secure Real-time Transport Protocol\" RFC 371 March 2004]]   M. Baugher & al. \"The Secure Real-time Transport Protocol\" RFC 371 March 2004]]","DOI":"10.17487\/rfc3711"},{"key":"e_1_3_2_1_4_1","volume-title":"ISART","author":"Rahikka Doug","year":"2000","unstructured":"Doug Rahikka , \"3 G Wireless Security - A Government Perspective\" , National Security Agency NSA-TRI23 , ISART September 2000 ]] Doug Rahikka, \"3G Wireless Security - A Government Perspective\", National Security Agency NSA-TRI23, ISART September 2000]]"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"crossref","unstructured":"T. Dierks C. Allen \"The TLS Protocol Version 1.0\" IETF RFC 2246 January 1999]]   T. Dierks C. Allen \"The TLS Protocol Version 1.0\" IETF RFC 2246 January 1999]]","DOI":"10.17487\/rfc2246"},{"key":"e_1_3_2_1_6_1","unstructured":"ITU-T H.323 v4 \"Packet-based multimedia communications systems\" July 2003]]  ITU-T H.323 v4 \"Packet-based multimedia communications systems\" July 2003]]"},{"key":"e_1_3_2_1_7_1","unstructured":"ITU-T H.235 v3 \"Security and encryption for H-Series multimedia terminals\" August 2003]]  ITU-T H.235 v3 \"Security and encryption for H-Series multimedia terminals\" August 2003]]"},{"key":"e_1_3_2_1_8_1","volume-title":"IETF nternet-draft-rescorla-dtls-05.txt","author":"Rescorla E.","year":"2004","unstructured":"E. Rescorla , N. Modadugu , \" Datagram Transport Layer Security\" , IETF nternet-draft-rescorla-dtls-05.txt , June 2004 ]] E. Rescorla, N. Modadugu, \"Datagram Transport Layer Security\", IETF nternet-draft-rescorla-dtls-05.txt , June 2004]]"},{"key":"e_1_3_2_1_9_1","volume-title":"Operation and Use","author":"Morrow R.","year":"2002","unstructured":"R. Morrow , \"Bluetooth : Operation and Use \", McGraw-Hill Professional , 1 st edition 2002 ]] R. Morrow, \"Bluetooth: Operation and Use\", McGraw-Hill Professional, 1st edition 2002]]","edition":"1"},{"key":"e_1_3_2_1_10_1","volume-title":"RFC 2543 -","author":"Handley M.","year":"1999","unstructured":"M. Handley , H. Schulzrinne , E. Schooler , J. Rosenberg , SIP: Session Initiation Protocol \", RFC 2543 - March 1999 ]] M. Handley, H. Schulzrinne, E. Schooler, J. Rosenberg, SIP: Session Initiation Protocol\", RFC 2543 - March 1999]]"},{"key":"e_1_3_2_1_11_1","volume-title":"Hermes Sciences","author":"Lagrange X.","unstructured":"X. Lagrange , P. Godlewski , S. Tabbane , \" R\u00e9seaux GSM\" , Hermes Sciences , 5 th edition]] X. Lagrange, P. Godlewski, S. Tabbane, \"R\u00e9seaux GSM\", Hermes Sciences, 5th edition]]","edition":"5"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1976.1055638"},{"key":"e_1_3_2_1_13_1","unstructured":"RSA Laboratories \"RSA Encryption Standard\" PKCS #1 November 1993]]  RSA Laboratories \"RSA Encryption Standard\" PKCS #1 November 1993]]"},{"key":"e_1_3_2_1_14_1","volume-title":"ICT 2005","author":"Bassil C.","year":"2005","unstructured":"C. Bassil , N. Rouhana , A. Serhrouchni , \" Towards securing VoIP communications with FNBDT \", ICT 2005 , May 2005 . in press.]] C.Bassil, N.Rouhana, A.Serhrouchni, \"Towards securing VoIP communications with FNBDT\", ICT 2005, May 2005. in press.]]"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-31957-3_91"},{"key":"e_1_3_2_1_16_1","unstructured":"Department of Defense Security Institute \"STU-III Handbook for Industry\" http:\/\/www.tscm.com\/STUIIIhandbook.html February 1997]]  Department of Defense Security Institute \"STU-III Handbook for Industry\" http:\/\/www.tscm.com\/STUIIIhandbook.html February 1997]]"},{"key":"e_1_3_2_1_17_1","unstructured":"M. Sharif D. Wijesekera J. Bret Michael \"Providing Secure Communication Services on the Public Telephone Network Infrastructures\" in press]]  M. Sharif D. Wijesekera J. Bret Michael \"Providing Secure Communication Services on the Public Telephone Network Infrastructures\" in press]]"},{"key":"e_1_3_2_1_18_1","volume-title":"FIPS PUB","author":"Advanced Encryption NIST","year":"1997","unstructured":"NIST , \" Advanced Encryption Standard (AES)\" , FIPS PUB 1997 , http:\/\/www.nist.gov\/aes]] NIST, \"Advanced Encryption Standard (AES)\", FIPS PUB 1997, http:\/\/www.nist.gov\/aes]]"},{"key":"e_1_3_2_1_19_1","volume-title":"IETF RFC","author":"Krawczyk K.","year":"1997","unstructured":"K. Krawczyk , M. Bellare , R. Canetti , \"HMAC : Keyed-Hashing for Message Authentication \", IETF RFC 2104, February 1997 ]] K. Krawczyk, M. Bellare, R. Canetti, \"HMAC: Keyed-Hashing for Message Authentication\", IETF RFC 2104, February 1997]]"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"crossref","unstructured":"R. Rivest \"The MD5 Message-Digest Algorithm\" IETF RFC 1321 April 1992]]   R. Rivest \"The MD5 Message-Digest Algorithm\" IETF RFC 1321 April 1992]]","DOI":"10.17487\/rfc1321"},{"key":"e_1_3_2_1_21_1","unstructured":"NIST FIPS PUB 180-1 \"Secure Hash Standard\" April 1995]]  NIST FIPS PUB 180-1 \"Secure Hash Standard\" April 1995]]"},{"key":"e_1_3_2_1_22_1","volume-title":"Internet draft : draft-tschofenig-sip-saml-04.txt, july","author":"H. Tschofenig","year":"2005","unstructured":"H. Tschofenig , J. Peterson , J. Polk , M. Tegnander , \" Using SAML for SIP\" , Internet draft : draft-tschofenig-sip-saml-04.txt, july 2005 .]] H. Tschofenig , J. Peterson , J. Polk, M. Tegnander, \"Using SAML for SIP\", Internet draft : draft-tschofenig-sip-saml-04.txt, july 2005.]]"},{"key":"e_1_3_2_1_23_1","volume-title":"SAR","author":"Bassil C.","year":"2004","unstructured":"C. Bassil , of the voice security \", SAR 04, June 2004 . in press.]] C. Bassil, et al, \"State-of-the-art of the voice security\", SAR 04, June 2004. in press.]]"},{"key":"e_1_3_2_1_24_1","volume-title":"SETIT","author":"Bassil C.","year":"2005","unstructured":"C. Bassil , A. Serhrouchni , N. Rouhana , \"Critical voice network security analysis and new approach for securing Voice over IP Communications \", SETIT 05, March 2005 . in press]] C. Bassil, A. Serhrouchni, N. Rouhana, \"Critical voice network security analysis and new approach for securing Voice over IP Communications\", SETIT 05, March 2005. in press]]"},{"key":"e_1_3_2_1_25_1","unstructured":"Jain SIP https:\/\/jain-sip.dev.java.net\/]]  Jain SIP https:\/\/jain-sip.dev.java.net\/]]"}],"event":{"name":"IWCMC06: 2006 International Wireless Communications and Mobile Computing Conference","sponsor":["ACM Association for Computing Machinery"],"location":"Vancouver British Columbia Canada","acronym":"IWCMC06"},"container-title":["Proceedings of the 2006 international conference on Wireless communications and mobile computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1143549.1143622","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1143549.1143622","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T15:06:35Z","timestamp":1750259195000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1143549.1143622"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006,7,3]]},"references-count":25,"alternative-id":["10.1145\/1143549.1143622","10.1145\/1143549"],"URL":"https:\/\/doi.org\/10.1145\/1143549.1143622","relation":{},"subject":[],"published":{"date-parts":[[2006,7,3]]},"assertion":[{"value":"2006-07-03","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}