{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:28:05Z","timestamp":1750307285397,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":29,"publisher":"ACM","license":[{"start":{"date-parts":[[2010,8,2]],"date-time":"2010-08-02T00:00:00Z","timestamp":1280707200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2010,8,2]]},"DOI":"10.1145\/1941530.1941534","type":"proceedings-article","created":{"date-parts":[[2011,2,15]],"date-time":"2011-02-15T18:31:03Z","timestamp":1297794663000},"page":"22-31","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Inter-domain and DoS-resistant call establishment protocol (IDDR-CEP)"],"prefix":"10.1145","author":[{"given":"Patrick","family":"Battistello","sequence":"first","affiliation":[{"name":"Orange Labs, Lannion, France"}]}],"member":"320","published-online":{"date-parts":[[2010,8,2]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"3GPP. IMS Functional Architecture. 3GPP TR33.828 May 2009.  3GPP. IMS Functional Architecture. 3GPP TR33.828 May 2009."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/INM.2007.374802"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/586110.586118"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"crossref","unstructured":"F. Andreasen M. Baugher and D. Wing. Session Description Protocol (SDP) Security Descriptions for Media Streams. RFC 4568 (Proposed Standard) July 2006.  F. Andreasen M. Baugher and D. Wing. Session Description Protocol (SDP) Security Descriptions for Media Streams. RFC 4568 (Proposed Standard) July 2006.","DOI":"10.17487\/rfc4568"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"crossref","unstructured":"J. Arkko E. Carrara F. Lindholm M. Naslund and K. Norrman. MIKEY: Multimedia Internet KEYing. RFC 3830 (Proposed Standard) Aug. 2004. Updated by RFC 4738.  J. Arkko E. Carrara F. Lindholm M. Naslund and K. Norrman. MIKEY: Multimedia Internet KEYing. RFC 3830 (Proposed Standard) Aug. 2004. Updated by RFC 4738.","DOI":"10.17487\/rfc3830"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1409908.1409938"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.5555\/861525"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"crossref","unstructured":"J. Elwell. Connected Identity in the Session Initiation Protocol (SIP). RFC 4916 (Proposed Standard) June 2007.  J. Elwell. Connected Identity in the Session Initiation Protocol (SIP). RFC 4916 (Proposed Standard) June 2007.","DOI":"10.17487\/rfc4916"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1595637.1595640"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1456625.1456635"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1231047.1231079"},{"key":"e_1_3_2_1_12_1","unstructured":"C. Jennings B. Lowekamp E. Rescorla S. Baset and H. Schulzrinne. REsource LOcation And Discovery (RELOAD) Base Protocol. IETF draft-ietf-p2psip-base-07 February 2010.  C. Jennings B. Lowekamp E. Rescorla S. Baset and H. Schulzrinne. REsource LOcation And Discovery (RELOAD) Base Protocol. IETF draft-ietf-p2psip-base-07 February 2010."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-10772-6_1"},{"key":"e_1_3_2_1_14_1","unstructured":"J. Mattsson and T. Tian. MIKEY-TICKET: An Additional Mode of Key Distribution in Multimedia Internet KEYing (MIKEY). IETF draft-mattsson-mikey-ticket-00 Oct. 2009.  J. Mattsson and T. Tian. MIKEY-TICKET: An Additional Mode of Key Distribution in Multimedia Internet KEYing (MIKEY). IETF draft-mattsson-mikey-ticket-00 Oct. 2009."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"crossref","unstructured":"D. McGrew and E. Rescorla. Datagram Transport Layer Security (DTLS) Extension to Establish Keys for Secure Real-time Transport Protocol (SRTP). IETF draft-ietf-avt-dtls-srtp-07 Feb. 2009.  D. McGrew and E. Rescorla. Datagram Transport Layer Security (DTLS) Extension to Establish Keys for Secure Real-time Transport Protocol (SRTP). IETF draft-ietf-avt-dtls-srtp-07 Feb. 2009.","DOI":"10.17487\/rfc5764"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"crossref","unstructured":"C. Neuman T. Yu S. Hartman and K. Raeburn. The Kerberos Network Authentication Service (V5). RFC 4120 (Proposed Standard) July 2005. Updated by RFCs 4537 5021.  C. Neuman T. Yu S. Hartman and K. Raeburn. The Kerberos Network Authentication Service (V5). RFC 4120 (Proposed Standard) July 2005. Updated by RFCs 4537 5021.","DOI":"10.17487\/rfc4120"},{"key":"e_1_3_2_1_17_1","unstructured":"S. Niccolini E. Chen J. Seedorf and H. Scholz. SPEERMINT Security Threats and Suggested Countermeasures. IETF draft-ietf-speermint-voipthreats-01 July 2009.  S. Niccolini E. Chen J. Seedorf and H. Scholz. SPEERMINT Security Threats and Suggested Countermeasures. IETF draft-ietf-speermint-voipthreats-01 July 2009."},{"key":"e_1_3_2_1_18_1","unstructured":"NIST. Advanced Encryption Standard (AES). FIPS PUB 197 Nov. 2001.  NIST. Advanced Encryption Standard (AES). FIPS PUB 197 Nov. 2001."},{"key":"e_1_3_2_1_19_1","unstructured":"NIST. The Keyed-Hash Message Authentication Code (HMAC). FIPS PUB 198 Mar. 2002.  NIST. The Keyed-Hash Message Authentication Code (HMAC). FIPS PUB 198 Mar. 2002."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1595637.1595641"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/PRDC.2005.50"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"crossref","unstructured":"J. Peterson and C. Jennings. Enhancements for Authenticated Identity Management in the Session Initiation Protocol (SIP). RFC 4474 (Proposed Standard) Aug. 2006.  J. Peterson and C. Jennings. Enhancements for Authenticated Identity Management in the Session Initiation Protocol (SIP). RFC 4474 (Proposed Standard) Aug. 2006.","DOI":"10.17487\/rfc4474"},{"key":"e_1_3_2_1_23_1","unstructured":"J. Rosenberg and C. Jennings. Verification Involving PSTN Reachability: Requirements and Architecture Overview. IETF draft-rosenberg-dispatch-vipr-overview-01 November 2009.  J. Rosenberg and C. Jennings. Verification Involving PSTN Reachability: Requirements and Architecture Overview. IETF draft-rosenberg-dispatch-vipr-overview-01 November 2009."},{"key":"e_1_3_2_1_24_1","unstructured":"J. Rosenberg H. Schulzrinne G. Camarillo A. Johnston J. Peterson R. Sparks M. Handley and E. Schooler. SIP: Session Initiation Protocol. RFC 3261 (Proposed Standard) June 2002. Updated by RFCs 3265 3853 4320 4916 5393.  J. Rosenberg H. Schulzrinne G. Camarillo A. Johnston J. Peterson R. Sparks M. Handley and E. Schooler. SIP: Session Initiation Protocol. RFC 3261 (Proposed Standard) June 2002. Updated by RFCs 3265 3853 4320 4916 5393."},{"key":"e_1_3_2_1_25_1","volume-title":"2005 IEEE Wireless Communications and Networking Conference","volume":"3","author":"Wan Z.","year":"2005"},{"key":"e_1_3_2_1_26_1","unstructured":"D. Wing. SIP E.164 Return Routability Check (RRC). IETF draft-wing-sip-e164-rrc-01 Feb. 2008.  D. Wing. SIP E.164 Return Routability Check (RRC). IETF draft-wing-sip-e164-rrc-01 Feb. 2008."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/AINAW.2007.203"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.5555\/1404803.1404806"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"crossref","unstructured":"P. Zimmermann A. Johnston and J. Callas. ZRTP: Media Path Key Agreement for Secure RTP. IETF draft-zimmermann-avt-zrtp-17 Jan. 2010.  P. Zimmermann A. Johnston and J. Callas. ZRTP: Media Path Key Agreement for Secure RTP. IETF draft-zimmermann-avt-zrtp-17 Jan. 2010.","DOI":"10.17487\/rfc6189"}],"event":{"name":"IPTComm '10: Principles, Systems and Applications of IP Telecommunications","sponsor":["Technische Universitat Munchen Technische Universitat Munchen","IFIP","SIGCOMM ACM Special Interest Group on Data Communication"],"location":"Munich Germany","acronym":"IPTComm '10"},"container-title":["Principles, Systems and Applications of IP Telecommunications"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1941530.1941534","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1941530.1941534","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T10:59:35Z","timestamp":1750244375000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1941530.1941534"}},"subtitle":["work in progress"],"short-title":[],"issued":{"date-parts":[[2010,8,2]]},"references-count":29,"alternative-id":["10.1145\/1941530.1941534","10.1145\/1941530"],"URL":"https:\/\/doi.org\/10.1145\/1941530.1941534","relation":{},"subject":[],"published":{"date-parts":[[2010,8,2]]},"assertion":[{"value":"2010-08-02","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}