{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:32:58Z","timestamp":1750307578821,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":11,"publisher":"ACM","license":[{"start":{"date-parts":[[2009,11,24]],"date-time":"2009-11-24T00:00:00Z","timestamp":1259020800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2009,11,24]]},"DOI":"10.1145\/1655925.1656087","type":"proceedings-article","created":{"date-parts":[[2009,11,24]],"date-time":"2009-11-24T15:21:10Z","timestamp":1259076070000},"page":"891-895","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["A highly effective model for security protection against eavesdropping exploits"],"prefix":"10.1145","author":[{"given":"Supachai","family":"Tangwongsan","sequence":"first","affiliation":[{"name":"Mahidol University, Bangkok, Thailand"}]},{"given":"Sathaporn","family":"Kassuvan","sequence":"additional","affiliation":[{"name":"Mahidol University, Bangkok, Thailand"}]}],"member":"320","published-online":{"date-parts":[[2009,11,24]]},"reference":[{"volume-title":"The E-Model, a Computational Model for Use in Transmission Planning. (Mar","year":"2005","key":"e_1_3_2_1_1_1","unstructured":"ITU-T G.107. The E-Model, a Computational Model for Use in Transmission Planning. (Mar . 2005 ). ITU-T G.107. The E-Model, a Computational Model for Use in Transmission Planning. (Mar. 2005)."},{"key":"e_1_3_2_1_2_1","volume-title":"Proceedings of the IEEE INFOCOM (Jun.","author":"Markopoulou A. P.","year":"2002","unstructured":"Markopoulou , A. P. , Tobagi , F. A. , and Karam , M. J . 2002. Assessment of VoIP Quality over Internet Backbones . In Proceedings of the IEEE INFOCOM (Jun. 2002 ). Markopoulou, A. P., Tobagi, F. A., and Karam, M. J. 2002. Assessment of VoIP Quality over Internet Backbones. In Proceedings of the IEEE INFOCOM (Jun. 2002)."},{"volume-title":"Transmission Impairments due to Speech Processing. (Feb","year":"2001","key":"e_1_3_2_1_3_1","unstructured":"ITU-T G.113. Transmission Impairments due to Speech Processing. (Feb . 2001 ). ITU-T G.113. Transmission Impairments due to Speech Processing. (Feb. 2001)."},{"key":"e_1_3_2_1_4_1","volume-title":"Appendix I: Provisional Planning Values for the Equipment Impairment Factor Ie and Packet-Loss Robustness Factor Bpl, (May","author":"Appendix I.","year":"2002","unstructured":"ITU-T G.113 Appendix I. Appendix I: Provisional Planning Values for the Equipment Impairment Factor Ie and Packet-Loss Robustness Factor Bpl, (May 2002 ). ITU-T G.113 Appendix I. Appendix I: Provisional Planning Values for the Equipment Impairment Factor Ie and Packet-Loss Robustness Factor Bpl, (May 2002)."},{"key":"e_1_3_2_1_5_1","volume-title":"Proceedings of the IEEE ICPWC (Jan.","author":"Rekha A. B.","year":"2005","unstructured":"Rekha , A. B. , Umadevi , B. , Solanke , Y. , and Kolli , S. R . 2005. End-to-End Security for GSM Users . In Proceedings of the IEEE ICPWC (Jan. 2005 ). Rekha, A. B., Umadevi, B., Solanke, Y., and Kolli, S. R. 2005. End-to-End Security for GSM Users. In Proceedings of the IEEE ICPWC (Jan. 2005)."},{"key":"e_1_3_2_1_6_1","volume-title":"Proceedings of WASET (Apr.","author":"Tangwongsan S.","year":"2007","unstructured":"Tangwongsan , S. and Kassuvan , S . 2007. A Security Model of Voice Eavesdropping Protection over Digital Networks . In Proceedings of WASET (Apr. 2007 ). Tangwongsan, S. and Kassuvan, S. 2007. A Security Model of Voice Eavesdropping Protection over Digital Networks. In Proceedings of WASET (Apr. 2007)."},{"key":"e_1_3_2_1_7_1","volume-title":"Proceedings of the IEEE ICCT (Nov.","author":"Tangwongsan S.","year":"2008","unstructured":"Tangwongsan , S. and Kassuvan , S . 2008. A Security Model of Multiparty Conference with Eavesdropping Protection over Digital Networks . In Proceedings of the IEEE ICCT (Nov. 2008 ). Tangwongsan, S. and Kassuvan, S. 2008. A Security Model of Multiparty Conference with Eavesdropping Protection over Digital Networks. In Proceedings of the IEEE ICCT (Nov. 2008)."},{"key":"e_1_3_2_1_8_1","volume-title":"Proceedings of the IEEE ICNSC (Apr.","author":"Qi H. F.","year":"2008","unstructured":"Qi , H. F. , Yang , X. H. , Jiang , R. , Liang , B. , and Zhou , S. J . 2008. Novel End-to-End Voice Encryption Method in GSM System . In Proceedings of the IEEE ICNSC (Apr. 2008 ). Qi, H. F., Yang, X. H., Jiang, R., Liang, B., and Zhou, S. J. 2008. Novel End-to-End Voice Encryption Method in GSM System. In Proceedings of the IEEE ICNSC (Apr. 2008)."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCIT.2007.344"},{"key":"e_1_3_2_1_10_1","volume-title":"Proceedings of the CCNC (Jan.","author":"Kokkonen E.","year":"2008","unstructured":"Kokkonen , E. and Matuszewski , M . 2008. Peer-to-Peer Security for Mobile Real-Time Communications with ZRTP . In Proceedings of the CCNC (Jan. 2008 ). Kokkonen, E. and Matuszewski, M. 2008. Peer-to-Peer Security for Mobile Real-Time Communications with ZRTP. In Proceedings of the CCNC (Jan. 2008)."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCSCT.2008.290"}],"event":{"name":"ICIS '09: The 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human","sponsor":["AICIT","ETRI","KISTI"],"location":"Seoul Korea","acronym":"ICIS '09"},"container-title":["Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1655925.1656087","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1655925.1656087","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T12:41:12Z","timestamp":1750250472000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1655925.1656087"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,11,24]]},"references-count":11,"alternative-id":["10.1145\/1655925.1656087","10.1145\/1655925"],"URL":"https:\/\/doi.org\/10.1145\/1655925.1656087","relation":{},"subject":[],"published":{"date-parts":[[2009,11,24]]},"assertion":[{"value":"2009-11-24","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}