{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:36:22Z","timestamp":1750307782015,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":13,"publisher":"ACM","license":[{"start":{"date-parts":[[2007,10,22]],"date-time":"2007-10-22T00:00:00Z","timestamp":1193011200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2007,10,22]]},"DOI":"10.1145\/1298216.1298238","type":"proceedings-article","created":{"date-parts":[[2007,11,15]],"date-time":"2007-11-15T14:30:20Z","timestamp":1195137020000},"page":"92-96","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Critical vpn security analysis and new approach for securing voip communications over vpn networks"],"prefix":"10.1145","author":[{"given":"Wafaa","family":"Bou Diab","sequence":"first","affiliation":[{"name":"Universit\u00e9 de Versailles Saint-Quentin en Yvelines, Versailles, France"}]},{"given":"Samir","family":"Tohme","sequence":"additional","affiliation":[{"name":"Universit\u00e9 de Versailles Saint-Quentin en Yvelines, Versailles, France"}]},{"given":"Carole","family":"Bassil","sequence":"additional","affiliation":[{"name":"Universit\u00e9 Saint Joseph, Beirut, Lebanon"}]}],"member":"320","published-online":{"date-parts":[[2007,10,22]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Proceedings of the XIII IEEE International Conference on Networks","author":"Passito A.","year":"2005","unstructured":"A. Passito . Evaluating Voice Speech Quality in 802.11b Networks with VPN\/IPSec . Proceedings of the XIII IEEE International Conference on Networks , 2005 . A. Passito. Evaluating Voice Speech Quality in 802.11b Networks with VPN\/IPSec. Proceedings of the XIII IEEE International Conference on Networks, 2005."},{"key":"e_1_3_2_1_2_1","volume-title":"SIP Security","author":"Steffen A.","year":"2004","unstructured":"A. Steffen , D. Kaufmann , and A. Stricker . SIP Security . Security Group Z\u00fcrcher Hochschule Winterthur , 2004 . A. Steffen, D. Kaufmann, and A. Stricker. SIP Security. Security Group Z\u00fcrcher Hochschule Winterthur, 2004."},{"key":"e_1_3_2_1_3_1","volume-title":"Curricular Response to the Real Time Data And VoIP Tidal Wave","author":"Hartpence B.","year":"2007","unstructured":"B. Hartpence . Curricular Response to the Real Time Data And VoIP Tidal Wave . The Consortium for Computing Sciences in Colleges , 2007 . B. Hartpence. Curricular Response to the Real Time Data And VoIP Tidal Wave. The Consortium for Computing Sciences in Colleges, 2007."},{"key":"e_1_3_2_1_4_1","volume-title":"ISSC","author":"Springer B.","year":"2003","unstructured":"B. Springer and L. Kilmartin . Performance evaluation of the Internet Key Exchange Protocol under dynamic VoIP network conditions . ISSC , Jul 2003 . B. Springer and L. Kilmartin. Performance evaluation of the Internet Key Exchange Protocol under dynamic VoIP network conditions. ISSC, Jul 2003."},{"key":"e_1_3_2_1_5_1","volume-title":"Jan","author":"Kuhn D.R.","year":"2005","unstructured":"D.R. Kuhn , T.J. Walsh , and S. Fries , Security Considerations for Voice over IP Systems. NIST Gaithersburg , Jan 2005 . D.R.Kuhn, T.J.Walsh, and S.Fries, Security Considerations for Voice over IP Systems. NIST Gaithersburg, Jan 2005."},{"key":"e_1_3_2_1_6_1","volume-title":"Advanced Encryption Standard (AES). Processing Standards Publication","author":"Information Federal","year":"2001","unstructured":"Federal Information . Advanced Encryption Standard (AES). Processing Standards Publication 197, Nov 2001 . Federal Information. Advanced Encryption Standard (AES). Processing Standards Publication 197, Nov 2001."},{"key":"e_1_3_2_1_7_1","unstructured":"J. Orrblad \"Alternatives to MIKEY\/SRTP to secure VoIP\" Master Thesis KTH Stockholm March 2005.  J. Orrblad \"Alternatives to MIKEY\/SRTP to secure VoIP\" Master Thesis KTH Stockholm March 2005."},{"key":"e_1_3_2_1_8_1","volume-title":"Helsinki","author":"Saarinen M.","year":"2004","unstructured":"M. Saarinen . Legacy User Authentication with IPSEC . Helsinki , Finland , Feb 2004 . M. Saarinen. Legacy User Authentication with IPSEC. Helsinki, Finland, Feb 2004."},{"key":"e_1_3_2_1_9_1","volume-title":"Seminar on Instant Messaging and Presence Architectures in the Internet","author":"Lindqvist N.","year":"2005","unstructured":"N. Lindqvist . SIP Session Initiation Protocol . Seminar on Instant Messaging and Presence Architectures in the Internet , 2005 . N. Lindqvist. SIP Session Initiation Protocol. Seminar on Instant Messaging and Presence Architectures in the Internet, 2005."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/WOWMOM.2006.31"},{"volume-title":"Proceedings of I Workshop on Computer Science and Information Systems","year":"2004","key":"e_1_3_2_1_11_1","unstructured":"Passito. Performance evaluation of VoIP traffic using IPSecurity protocol . Proceedings of I Workshop on Computer Science and Information Systems , Brazil 2004 . Passito. Performance evaluation of VoIP traffic using IPSecurity protocol. Proceedings of I Workshop on Computer Science and Information Systems, Brazil 2004."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.5555\/784592.784778"},{"key":"e_1_3_2_1_13_1","volume-title":"Taiwan","author":"Huang S.","year":"2005","unstructured":"S. Huang , Z. Liu , and J. Chen . SIP-Based Mobile VPN for Real-Time Applications. Hsinchu , Taiwan 2005 . S. Huang, Z. Liu, and J. Chen. SIP-Based Mobile VPN for Real-Time Applications. Hsinchu, Taiwan 2005."}],"event":{"name":"MSWiM07: 10th International Symposium on Modeling, Analysis and Simulation of Wireless and Mobile Systems","sponsor":["ACM Association for Computing Machinery","SIGSIM ACM Special Interest Group on Simulation and Modeling"],"location":"Chania Crete Island Greece","acronym":"MSWiM07"},"container-title":["Proceedings of the 3rd ACM workshop on Wireless multimedia networking and performance modeling"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1298216.1298238","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1298216.1298238","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T13:56:08Z","timestamp":1750254968000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1298216.1298238"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,10,22]]},"references-count":13,"alternative-id":["10.1145\/1298216.1298238","10.1145\/1298216"],"URL":"https:\/\/doi.org\/10.1145\/1298216.1298238","relation":{},"subject":[],"published":{"date-parts":[[2007,10,22]]},"assertion":[{"value":"2007-10-22","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}