{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:11:10Z","timestamp":1750306270902,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":14,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,3,22]],"date-time":"2017-03-22T00:00:00Z","timestamp":1490140800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100002418","name":"Intel Corporation","doi-asserted-by":"publisher","award":["21626857"],"award-info":[{"award-number":["21626857"]}],"id":[{"id":"10.13039\/100002418","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,3,22]]},"DOI":"10.1145\/3018896.3025145","type":"proceedings-article","created":{"date-parts":[[2018,2,23]],"date-time":"2018-02-23T16:12:59Z","timestamp":1519402379000},"page":"1-5","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Multichannel key exchange"],"prefix":"10.1145","author":[{"given":"Siddharth","family":"Gupta","sequence":"first","affiliation":[{"name":"Purdue University"}]},{"given":"Sahithya","family":"Kodam","sequence":"additional","affiliation":[{"name":"Purdue University"}]},{"given":"Baijian","family":"Yang","sequence":"additional","affiliation":[{"name":"Purdue University"}]}],"member":"320","published-online":{"date-parts":[[2017,3,22]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Security Engineering: A Guide to Building Dependable Distributed Systems New York Wiley Computer Publishing Google Scholar.","author":"Anderson R","year":"2001","unstructured":"R Anderson . 2001 . Security Engineering: A Guide to Building Dependable Distributed Systems New York Wiley Computer Publishing Google Scholar. (2001). R Anderson. 2001. Security Engineering: A Guide to Building Dependable Distributed Systems New York Wiley Computer Publishing Google Scholar. (2001)."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2013.10.013"},{"key":"e_1_3_2_1_3_1","first-page":"289","article-title":"Apparatus and method of splitting a data stream over multiple transport control protocol\/internet protocol (TCP\/IP) connections. (Oct. 30 2007)","volume":"7","author":"Qigg Brown Deanna Lynn","year":"2007","unstructured":"Deanna Lynn Q Qigg Brown , Vinit Jain , Vasu Vallabhaneni , and Venkat Venkatsubra . 2007 . Apparatus and method of splitting a data stream over multiple transport control protocol\/internet protocol (TCP\/IP) connections. (Oct. 30 2007) . US Patent 7 , 289 ,509. Deanna Lynn QQigg Brown, Vinit Jain, Vasu Vallabhaneni, and Venkat Venkatsubra. 2007. Apparatus and method of splitting a data stream over multiple transport control protocol\/internet protocol (TCP\/IP) connections. (Oct. 30 2007). US Patent 7,289,509.","journal-title":"US Patent"},{"key":"e_1_3_2_1_4_1","volume-title":"International Workshop on Security Protocols. Springer, 139--146","author":"Christianson Bruce","year":"2007","unstructured":"Bruce Christianson . 2007 . Multi-Channel Key Agreement Using Encrypted Public Key Exchange (Transcript of Discussion) . In International Workshop on Security Protocols. Springer, 139--146 . Bruce Christianson. 2007. Multi-Channel Key Agreement Using Encrypted Public Key Exchange (Transcript of Discussion). In International Workshop on Security Protocols. Springer, 139--146."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1002\/sec.1172"},{"key":"e_1_3_2_1_7_1","volume-title":"Communications and Signal Processing, 2003 and Fourth Pacific Rim Conference on Multimedia. Proceedings of the 2003 Joint Conference of the Fourth International Conference on","volume":"3","author":"Fu Qiang","year":"2003","unstructured":"Qiang Fu and Jadwiga Indulska . 2003 . Splitting TCP in parallel for error-prone links. In Information , Communications and Signal Processing, 2003 and Fourth Pacific Rim Conference on Multimedia. Proceedings of the 2003 Joint Conference of the Fourth International Conference on , Vol. 3 . IEEE, 1934--1938. Qiang Fu and Jadwiga Indulska. 2003. Splitting TCP in parallel for error-prone links. In Information, Communications and Signal Processing, 2003 and Fourth Pacific Rim Conference on Multimedia. Proceedings of the 2003 Joint Conference of the Fourth International Conference on, Vol. 3. IEEE, 1934--1938."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10623-014-9972-2"},{"key":"e_1_3_2_1_9_1","volume-title":"Parallel and Distributed Processing Symposium., Proceedings International, IPDPS","author":"Hacker Thomas J","year":"2001","unstructured":"Thomas J Hacker , Brian D Athey , and Brian Noble . 2001 . The end-to-end performance effects of parallel TCP sockets on a lossy wide-area network . In Parallel and Distributed Processing Symposium., Proceedings International, IPDPS 2002, Abstracts and CD-ROM. IEEE, 10--pp. Thomas J Hacker, Brian D Athey, and Brian Noble. 2001. The end-to-end performance effects of parallel TCP sockets on a lossy wide-area network. In Parallel and Distributed Processing Symposium., Proceedings International, IPDPS 2002, Abstracts and CD-ROM. IEEE, 10--pp."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1002\/dac.1355"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/ITC.2013.6662945"},{"volume-title":"Proceedings of the 5th International ICST Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness","author":"Nilsson Dennis K","key":"e_1_3_2_1_12_1","unstructured":"Dennis K Nilsson , Ulf E Larson , and Erland Jonsson . 2008. Auxiliary channel Diffie-Hellman encrypted key-exchange authentication . In Proceedings of the 5th International ICST Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness . ICST (Institute for Computer Sciences , Social- Informatics and Telecommunications Engineering), 18. Dennis K Nilsson, Ulf E Larson, and Erland Jonsson. 2008. Auxiliary channel Diffie-Hellman encrypted key-exchange authentication. In Proceedings of the 5th International ICST Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness. ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering), 18."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2578901"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.5555\/1788857.1788874"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.5555\/1862266.1862276"}],"event":{"name":"ICC '17: Second International Conference on Internet of Things, Data and Cloud Computing","acronym":"ICC '17","location":"Cambridge United Kingdom"},"container-title":["Proceedings of the Second International Conference on Internet of things, Data and Cloud Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3018896.3025145","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3018896.3025145","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:38:40Z","timestamp":1750221520000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3018896.3025145"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,3,22]]},"references-count":14,"alternative-id":["10.1145\/3018896.3025145","10.1145\/3018896"],"URL":"https:\/\/doi.org\/10.1145\/3018896.3025145","relation":{},"subject":[],"published":{"date-parts":[[2017,3,22]]},"assertion":[{"value":"2017-03-22","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}