{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:28:04Z","timestamp":1750307284745,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":38,"publisher":"ACM","license":[{"start":{"date-parts":[[2010,8,2]],"date-time":"2010-08-02T00:00:00Z","timestamp":1280707200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2010,8,2]]},"DOI":"10.1145\/1941530.1941549","type":"proceedings-article","created":{"date-parts":[[2011,2,15]],"date-time":"2011-02-15T18:31:03Z","timestamp":1297794663000},"page":"134-145","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":8,"title":["Pr2-P2PSIP"],"prefix":"10.1145","author":[{"given":"Ali","family":"Fessi","sequence":"first","affiliation":[{"name":"Technische Universit\u00e4t M\u00fcnchen, Munich, Germany"}]},{"given":"Nathan","family":"Evans","sequence":"additional","affiliation":[{"name":"Technische Universit\u00e4t M\u00fcnchen, Munich, Germany"}]},{"given":"Heiko","family":"Niedermayer","sequence":"additional","affiliation":[{"name":"Technische Universit\u00e4t M\u00fcnchen, Munich, Germany"}]},{"given":"Ralph","family":"Holz","sequence":"additional","affiliation":[{"name":"Technische Universit\u00e4t M\u00fcnchen, Munich, Germany"}]}],"member":"320","published-online":{"date-parts":[[2010,8,2]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Geo ip tool - view my ip information. http:\/\/www.geoiptool.com\/. Last checked on Feb. 10th 2010.  Geo ip tool - view my ip information. http:\/\/www.geoiptool.com\/. Last checked on Feb. 10th 2010."},{"key":"e_1_3_2_1_2_1","unstructured":"IETF P2PSIP working group charter. http:\/\/www.ietf.org\/dyn\/wg\/charter\/p2psip-charter.html. Last checked on Feb. 10th 2010.  IETF P2PSIP working group charter. http:\/\/www.ietf.org\/dyn\/wg\/charter\/p2psip-charter.html. Last checked on Feb. 10th 2010."},{"key":"e_1_3_2_1_3_1","first-page":"245","volume-title":"Proceedings of Information Hiding Workshop (IH 2001","author":"Back A.","year":"2001"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1595637.1595645"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315258"},{"key":"e_1_3_2_1_6_1","unstructured":"D. A. Bryan and T. Broadband. P2P SIP. http:\/\/www.p2psip.org. Last checked on Feb. 10th 2010; last updated Jul. 2009.  D. A. Bryan and T. Broadband. P2P SIP. http:\/\/www.p2psip.org. Last checked on Feb. 10th 2010; last updated Jul. 2009."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/AAA-IDEA.2005.15"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2006.1705881"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.5555\/1779330.1779333"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.5555\/1251375.1251396"},{"key":"e_1_3_2_1_11_1","unstructured":"I. P. M. et. al. I2p tech intro.  I. P. M. et. al. I2p tech intro."},{"key":"e_1_3_2_1_12_1","unstructured":"H. Federrath. Jap: Anonymity and privacy. http:\/\/anon.inf.tu-dresden.de 2000--2006.  H. Federrath. Jap: Anonymity and privacy. http:\/\/anon.inf.tu-dresden.de 2000--2006."},{"key":"e_1_3_2_1_13_1","unstructured":"N. Ferguson and B. Schneier. Practical Cryptography. John Wiley and Sons (1st edition) 2003.   N. Ferguson and B. Schneier. Practical Cryptography . John Wiley and Sons (1st edition) 2003."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.5555\/646334.687802"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.5555\/647594.731526"},{"volume-title":"IPTPS'06: The 5th International Workshop on Peer-to-Peer Systems","year":"2006","author":"Guha S.","key":"e_1_3_2_1_16_1"},{"volume-title":"Work in Progress","year":"2010","author":"Jennings C.","key":"e_1_3_2_1_17_1"},{"volume-title":"Work in Progress","year":"2010","author":"Jennings C.","key":"e_1_3_2_1_18_1"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-45172-3_2"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.5555\/646334.687801"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-85230-8_3"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1133572.1133578"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2005.12"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180409"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2006.24"},{"volume-title":"Addison-Wesley Publishing Company (2nd Edition)","year":"2004","author":"Rausand M.","key":"e_1_3_2_1_26_1"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/290163.290168"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/644527.644537"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"crossref","unstructured":"J. Rosenberg. A Presence Event Package for the Session Initiation Protocol (SIP). RFC 3856 (Proposed Standard) Aug. 2004.  J. Rosenberg. A Presence Event Package for the Session Initiation Protocol (SIP). RFC 3856 (Proposed Standard) Aug. 2004.","DOI":"10.17487\/rfc3856"},{"key":"e_1_3_2_1_30_1","first-page":"3265","volume":"3261","author":"Rosenberg J.","year":"2002","journal-title":"SIP: Session Initiation Protocol. RFC"},{"volume-title":"Manning Publications Co.","year":"1999","author":"Rosing M.","key":"e_1_3_2_1_31_1"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2006.1705882"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-39650-5_7"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"crossref","unstructured":"K. Singh and H. Schulzrinne. Peer-to-peer internet telephony using sip. Technical report Columbia University CUCS-044-04 2004.  K. Singh and H. Schulzrinne. Peer-to-peer internet telephony using sip. Technical report Columbia University CUCS-044-04 2004.","DOI":"10.1145\/1065983.1065999"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/1298306.1298323"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/1102120.1102133"},{"volume-title":"In Proc. of NSDI. ACM\/USENIX","year":"2005","author":"Zhuang L.","key":"e_1_3_2_1_37_1"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/P2P.2006.13"}],"event":{"name":"IPTComm '10: Principles, Systems and Applications of IP Telecommunications","sponsor":["Technische Universitat Munchen Technische Universitat Munchen","IFIP","SIGCOMM ACM Special Interest Group on Data Communication"],"location":"Munich Germany","acronym":"IPTComm '10"},"container-title":["Principles, Systems and Applications of IP Telecommunications"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1941530.1941549","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1941530.1941549","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T10:59:35Z","timestamp":1750244375000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1941530.1941549"}},"subtitle":["privacy preserving P2P signaling for VoIP and IM"],"short-title":[],"issued":{"date-parts":[[2010,8,2]]},"references-count":38,"alternative-id":["10.1145\/1941530.1941549","10.1145\/1941530"],"URL":"https:\/\/doi.org\/10.1145\/1941530.1941549","relation":{},"subject":[],"published":{"date-parts":[[2010,8,2]]},"assertion":[{"value":"2010-08-02","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}