{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:52:06Z","timestamp":1750308726465,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":16,"publisher":"ACM","license":[{"start":{"date-parts":[[2013,10,15]],"date-time":"2013-10-15T00:00:00Z","timestamp":1381795200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2013,10,15]]},"DOI":"10.1145\/2589649.2554669","type":"proceedings-article","created":{"date-parts":[[2014,3,4]],"date-time":"2014-03-04T13:25:03Z","timestamp":1393939503000},"page":"1-7","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Bringing VoIP Signatures to Mobile Devices"],"prefix":"10.1145","author":[{"given":"Ronald","family":"Marx","sequence":"first","affiliation":[{"name":"Fraunhofer Institute for Secure Information Technology SIT, Darmstadt, Germany"}]},{"given":"Nicolai","family":"Kuntze","sequence":"additional","affiliation":[{"name":"Fraunhofer Institute for Secure Information Technology SIT, Darmstadt, Germany"}]},{"given":"Hagen","family":"Lauer","sequence":"additional","affiliation":[{"name":"Technische Hochschule Mittelhessen, Gie\u00dfen, Germany"}]}],"member":"320","published-online":{"date-parts":[[2013,10,15]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/IAS.2008.29"},{"key":"e_1_3_2_1_2_1","volume-title":"Secure Real-Time Transport Protocol (SRTP). IETF Request for Comments: RFC","author":"Baugher M.","year":"2005","unstructured":"M. Baugher Secure Real-Time Transport Protocol (SRTP). IETF Request for Comments: RFC 3711, Mar. 2005 . M. Baugher et al. Secure Real-Time Transport Protocol (SRTP). IETF Request for Comments: RFC 3711, Mar. 2005."},{"key":"e_1_3_2_1_3_1","volume-title":"July","author":"Handley M.","year":"2006","unstructured":"M. Handley , V. Jacobson , and C. Perkins . SDP: Session Description Protocol. RFC 4566 (Proposed Standard) , July 2006 . M. Handley, V. Jacobson, and C. Perkins. SDP: Session Description Protocol. RFC 4566 (Proposed Standard), July 2006."},{"key":"e_1_3_2_1_4_1","volume-title":"Security and Non-Repudiation for Voice-over-IP conversations. Thesis","author":"Hett C.","year":"2006","unstructured":"C. Hett . Security and Non-Repudiation for Voice-over-IP conversations. Thesis , Technical University Darmstadt , Germany, July 2006 . C. Hett. Security and Non-Repudiation for Voice-over-IP conversations. Thesis, Technical University Darmstadt, Germany, July 2006."},{"key":"e_1_3_2_1_5_1","volume-title":"Proceedings of the 3rd Annual VoIP Security Workshop (VSW06)","author":"Hett C.","year":"2006","unstructured":"C. Hett , N. Kuntze , and A. U. Schmidt . A secure archive for Voice-over-IP conversations. In D. S. et al., editor , Proceedings of the 3rd Annual VoIP Security Workshop (VSW06) . ACM, 2006 . C. Hett, N. Kuntze, and A. U. Schmidt. A secure archive for Voice-over-IP conversations. In D. S. et al., editor, Proceedings of the 3rd Annual VoIP Security Workshop (VSW06). ACM, 2006."},{"key":"e_1_3_2_1_6_1","volume-title":"Sandton, South Africa, 5th-7th","author":"Hett C.","year":"2006","unstructured":"C. Hett , N. Kuntze , and A. U. Schmidt . Security and Non-Repudiation for Voice-Over-IP Conversations. Poster presentation at the ISSA 2006 From Insight to Foresight Conference , Sandton, South Africa, 5th-7th July 2006 , 2006. C. Hett, N. Kuntze, and A. U. Schmidt. Security and Non-Repudiation for Voice-Over-IP Conversations. Poster presentation at the ISSA 2006 From Insight to Foresight Conference, Sandton, South Africa, 5th-7th July 2006, 2006."},{"volume-title":"ICTFacts and Figures - The world","year":"2013","key":"e_1_3_2_1_7_1","unstructured":"International Telecommunication Union. ICTFacts and Figures - The world in 2013 , Feb. 2013. International Telecommunication Union. ICTFacts and Figures - The world in 2013, Feb. 2013."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33962-2_1"},{"key":"e_1_3_2_1_9_1","volume-title":"IETF Internet-Draft","author":"Kunz T.","year":"2008","unstructured":"T. Kunz , S. Okunick , and U. Pordesch . Data Structure for Security Suitabilities of Cryptographic Algorithms (DSSC)-Long-term Archive And Notary Services (LTANS). Technical report , IETF Internet-Draft , 2008 . T. Kunz, S. Okunick, and U. Pordesch. Data Structure for Security Suitabilities of Cryptographic Algorithms (DSSC)-Long-term Archive And Notary Services (LTANS). Technical report, IETF Internet-Draft, 2008."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-4048(98)80005-8"},{"key":"e_1_3_2_1_11_1","volume-title":"IIT Real-Time Communications","author":"Marx R.","year":"2011","unstructured":"R. Marx . VoIP authentication and non-repudiation by means of the new German ID card and VoIP Signatures . In IIT Real-Time Communications . Illinois Institute of Technology , Oct. 2011 . R. Marx. VoIP authentication and non-repudiation by means of the new German ID card and VoIP Signatures. In IIT Real-Time Communications. Illinois Institute of Technology, Oct. 2011."},{"volume-title":"Ofcom","year":"2012","key":"e_1_3_2_1_12_1","unstructured":"Ofcom. Communications market report 2012. Technical report , Ofcom , July 2012 . Ofcom. Communications market report 2012. Technical report, Ofcom, July 2012."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.csl.2005.07.003"},{"key":"e_1_3_2_1_14_1","volume-title":"Session Initiation Protocol (SIP). IETF Request for Comments: RFC","author":"Rosenberg J.","year":"2002","unstructured":"J. Rosenberg Session Initiation Protocol (SIP). IETF Request for Comments: RFC 3261, June 2002 . J. Rosenberg et al. Session Initiation Protocol (SIP). IETF Request for Comments: RFC 3261, June 2002."},{"key":"e_1_3_2_1_15_1","volume-title":"RTP: A Transport Protocol for Real-Time Applications. IETF Request for Comments: RFC","author":"Schulzrinne H.","year":"2003","unstructured":"H. Schulzrinne , S. Casner , R. Frederick , and V. Jacobson . RTP: A Transport Protocol for Real-Time Applications. IETF Request for Comments: RFC 3550, July 2003 . H. Schulzrinne, S. Casner, R. Frederick, and V. Jacobson. RTP: A Transport Protocol for Real-Time Applications. IETF Request for Comments: RFC 3550, July 2003."},{"key":"e_1_3_2_1_16_1","first-page":"12","article-title":"Parliament and the Concil of the European Union. Directive 1999\/93\/EC of the European Parliament and of the Council of 13 December 1999 on a Community framework for electronic signatures","volume":"12","year":"2000","unstructured":"The European Parliament and the Concil of the European Union. Directive 1999\/93\/EC of the European Parliament and of the Council of 13 December 1999 on a Community framework for electronic signatures . Official Journal of the European Communities, L 12 : 12 -- 20 , 2000 . The European Parliament and the Concil of the European Union. Directive 1999\/93\/EC of the European Parliament and of the Council of 13 December 1999 on a Community framework for electronic signatures. Official Journal of the European Communities, L 12:12--20, 2000.","journal-title":"Official Journal of the European Communities, L"}],"event":{"name":"IPTComm '13: Principles, Systems and Applications of IP Telecommunications","sponsor":["SIGCOMM ACM Special Interest Group on Data Communication"],"location":"Chicago IL USA","acronym":"IPTComm '13"},"container-title":["Proceedings of Principles, Systems and Applications on IP Telecommunications"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2589649.2554669","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2589649.2554669","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T20:14:46Z","timestamp":1750277686000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2589649.2554669"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,10,15]]},"references-count":16,"alternative-id":["10.1145\/2589649.2554669","10.1145\/2589649"],"URL":"https:\/\/doi.org\/10.1145\/2589649.2554669","relation":{},"subject":[],"published":{"date-parts":[[2013,10,15]]},"assertion":[{"value":"2013-10-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}