{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:32:29Z","timestamp":1750307549459,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":24,"publisher":"ACM","license":[{"start":{"date-parts":[[2009,10,28]],"date-time":"2009-10-28T00:00:00Z","timestamp":1256688000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2009,10,28]]},"DOI":"10.1145\/1641944.1641948","type":"proceedings-article","created":{"date-parts":[[2009,11,4]],"date-time":"2009-11-04T18:29:35Z","timestamp":1257359375000},"page":"13-22","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["End-to-end security and seamless handover solution for real-time communications over 3G networks"],"prefix":"10.1145","author":[{"given":"Wafaa","family":"Bou Diab","sequence":"first","affiliation":[{"name":"Universit\u00e9 de Versailles Saint-Quentin, Versailles, France"}]},{"given":"Samir","family":"Tohme","sequence":"additional","affiliation":[{"name":"Universit\u00e9 de Versailles Saint-Quentin, Versailles, France"}]}],"member":"320","published-online":{"date-parts":[[2009,10,28]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"3GPP Technical Specification TS 33.203 3G security. Access security for IP-based service.  3GPP Technical Specification TS 33.203 3G security. Access security for IP-based service."},{"volume-title":"Stage 2.","year":"2005","key":"e_1_3_2_1_2_1","unstructured":"3GPP2 X.S0013-002-A v1.0 , IP Multimedia Subsystem (IMS) , Stage 2. November 2005 3GPP2 X.S0013-002-A v1.0, IP Multimedia Subsystem (IMS), Stage 2. November 2005"},{"key":"e_1_3_2_1_3_1","unstructured":"Dinh Dang T. Sonkoly B. Moln\u00e1r S. 2002. Fractal Analysis and Modeling of VoIP Traffic. Work supported by the Ministry of Education Hungary under the reference No. IKTA-0092\/2002  Dinh Dang T. Sonkoly B. Moln\u00e1r S. 2002. Fractal Analysis and Modeling of VoIP Traffic. Work supported by the Ministry of Education Hungary under the reference No. IKTA-0092\/2002"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1280940.1280994"},{"key":"e_1_3_2_1_5_1","unstructured":"Balderas T. Cumplido R. and Cumplidoparra R. A. 2004. Security Architecture in UMTS Third Generation Cellular Networks. Coordinaci\u00f3n de Ciencias Computacionales INAOE.  Balderas T. Cumplido R. and Cumplidoparra R. A. 2004. Security Architecture in UMTS Third Generation Cellular Networks. Coordinaci\u00f3n de Ciencias Computacionales INAOE."},{"key":"e_1_3_2_1_6_1","unstructured":"Wong M. 2004. 3GPP2 S.R0086-A IMS Security Framework.  Wong M. 2004. 3GPP2 S.R0086-A IMS Security Framework."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-006-8864-9"},{"key":"e_1_3_2_1_8_1","article-title":"Characterizing superposition Arrival Processes in packet multiplexers for voice and data","author":"Kotikalapudi S.","year":"1986","unstructured":"Kotikalapudi , S. and Whitt , W. 1986 . Characterizing superposition Arrival Processes in packet multiplexers for voice and data . IEEE Journal on selected areas in communications. Kotikalapudi, S. and Whitt, W. 1986. Characterizing superposition Arrival Processes in packet multiplexers for voice and data. IEEE Journal on selected areas in communications.","journal-title":"IEEE Journal on selected areas in communications."},{"key":"e_1_3_2_1_9_1","volume-title":"IEEE International Conference on Networks ICON.","author":"Passito A.","year":"2005","unstructured":"Passito , A. , 2005 . Evaluating Voice Speech Quality in 802.11b Networks with VPN\/IPSec . IEEE International Conference on Networks ICON. Passito, A., et al. 2005. Evaluating Voice Speech Quality in 802.11b Networks with VPN\/IPSec. IEEE International Conference on Networks ICON."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/11573036_79"},{"volume-title":"Evaluation of CRTP Performance over Cellular Radio Links","author":"Degermark M.","key":"e_1_3_2_1_11_1","unstructured":"Degermark , M. 2000. Evaluation of CRTP Performance over Cellular Radio Links . IEEE Personal Communications . Degermark, M. 2000. Evaluation of CRTP Performance over Cellular Radio Links. IEEE Personal Communications."},{"key":"e_1_3_2_1_12_1","unstructured":"Xenakis C. and Lazaros M. 2008. IPsec-based end-to-end VPN deployment over UMTS. Computer Communications.  Xenakis C. and Lazaros M. 2008. IPsec-based end-to-end VPN deployment over UMTS. Computer Communications."},{"key":"e_1_3_2_1_13_1","unstructured":"One-way transmission time. ITU-T Std. Recommendation G.114 1996.  One-way transmission time. ITU-T Std. Recommendation G.114 1996."},{"volume-title":"proceedings of the Computer Security Applications Conference.","author":"Barbieri R.","key":"e_1_3_2_1_14_1","unstructured":"Barbieri , R. , Bruschi , D. and Rosti , E . 2002. Voice over IPsec: Analysis and Solutions . In proceedings of the Computer Security Applications Conference. Barbieri, R., Bruschi, D. and Rosti, E. 2002. Voice over IPsec: Analysis and Solutions. In proceedings of the Computer Security Applications Conference."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"crossref","unstructured":"Van Q. Wei A. Geller B. and Dupeyrat G. 2005. A Model-Based Analysis of Secure Video Transmission Based on IPSec and IPv4. In proceedings of the ETRI Journal.  Van Q. Wei A. Geller B. and Dupeyrat G. 2005. A Model-Based Analysis of Secure Video Transmission Based on IPSec and IPv4. In proceedings of the ETRI Journal.","DOI":"10.4218\/etrij.05.0204.0047"},{"key":"e_1_3_2_1_16_1","volume-title":"On the Use of Fractional Brownian Motion in the Theory of Connectionless Networks. In proceedings of the IEEE Journal on Selected Areas in Communications.","author":"Norros I.","year":"1995","unstructured":"Norros , I. 1995 . On the Use of Fractional Brownian Motion in the Theory of Connectionless Networks. In proceedings of the IEEE Journal on Selected Areas in Communications. Norros, I. 1995. On the Use of Fractional Brownian Motion in the Theory of Connectionless Networks. In proceedings of the IEEE Journal on Selected Areas in Communications."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/49.103559"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"crossref","unstructured":"Park K. and Willinger W. 2000. Self-similar Network Traffic: An Overview In Self-Similar Network Traffic and Performance Evaluation. Wiley-Interscience New York.  Park K. and Willinger W. 2000. Self-similar Network Traffic: An Overview In Self-Similar Network Traffic and Performance Evaluation. Wiley-Interscience New York.","DOI":"10.1002\/047120644X"},{"key":"e_1_3_2_1_19_1","unstructured":"Ramaswamy R. and Wolf T. 2004. Characterizating Network Processing Delay. IEEE Communications Society Globecom.  Ramaswamy R. and Wolf T. 2004. Characterizating Network Processing Delay. IEEE Communications Society Globecom."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"crossref","unstructured":"Huang Z. and Gu X. 2007. Design and Performance Analysis of CZML-IPSec for Satellite IP Networks. NPC.   Huang Z. and Gu X. 2007. Design and Performance Analysis of CZML-IPSec for Satellite IP Networks. NPC.","DOI":"10.1007\/978-3-540-74784-0_29"},{"key":"e_1_3_2_1_21_1","unstructured":"Van D. Q. Weiz A. and Geller B. 2008. Improving End to End Latency for Voice over IPSec Streams. Supported in part by the international project PRA-SIP under Grant SIP04-03.  Van D. Q. Weiz A. and Geller B. 2008. Improving End to End Latency for Voice over IPSec Streams. Supported in part by the international project PRA-SIP under Grant SIP04-03."},{"key":"e_1_3_2_1_22_1","unstructured":"Duong H. Dadej A. and Gordon S. 2003. Transferring Header Compression Context in Mobile IP Networks.  Duong H. Dadej A. and Gordon S. 2003. Transferring Header Compression Context in Mobile IP Networks."},{"key":"e_1_3_2_1_24_1","unstructured":"Kim P. S. and Kim Y. J. 2006. New Authentication Mechanism for Vertical Handovers between IEEE 802.16e and 3G Wireless Networks. In proceedings of the IJCSNS.  Kim P. S. and Kim Y. J. 2006. New Authentication Mechanism for Vertical Handovers between IEEE 802.16e and 3G Wireless Networks. In proceedings of the IJCSNS."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-006-9146-2"}],"event":{"name":"MSWiM '09: The 12th ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems","sponsor":["SIGSIM ACM Special Interest Group on Simulation and Modeling"],"location":"Tenerife, Canary Islands Spain","acronym":"MSWiM '09"},"container-title":["Proceedings of the 5th ACM symposium on QoS and security for wireless and mobile networks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1641944.1641948","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1641944.1641948","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T12:23:35Z","timestamp":1750249415000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1641944.1641948"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,10,28]]},"references-count":24,"alternative-id":["10.1145\/1641944.1641948","10.1145\/1641944"],"URL":"https:\/\/doi.org\/10.1145\/1641944.1641948","relation":{},"subject":[],"published":{"date-parts":[[2009,10,28]]},"assertion":[{"value":"2009-10-28","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}