{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:31:25Z","timestamp":1750221085406,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":38,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,1,4]],"date-time":"2019-01-04T00:00:00Z","timestamp":1546560000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,1,4]]},"DOI":"10.1145\/3288599.3288623","type":"proceedings-article","created":{"date-parts":[[2019,1,9]],"date-time":"2019-01-09T18:42:31Z","timestamp":1547059351000},"page":"193-202","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["pTASC"],"prefix":"10.1145","author":[{"given":"Patr\u00edcia R.","family":"Sousa","sequence":"first","affiliation":[{"name":"DCC-FCUP\/CRACS-INESC TEC, Porto, Portugal"}]},{"given":"Andr\u00e9","family":"Cirne","sequence":"additional","affiliation":[{"name":"DCC-FCUP\/CRACS-INESC TEC, Porto, Portugal"}]},{"given":"Jo\u00e3o S.","family":"Resende","sequence":"additional","affiliation":[{"name":"DCC-FCUP\/CRACS-INESC TEC, Porto, Portugal"}]},{"given":"Rolando","family":"Martins","sequence":"additional","affiliation":[{"name":"DCC-FCUP\/CRACS-INESC TEC, Porto, Portugal"}]},{"given":"Lu\u00eds","family":"Antunes","sequence":"additional","affiliation":[{"name":"DCC-FCUP\/CRACS-INESC TEC, Porto, Portugal"}]}],"member":"320","published-online":{"date-parts":[[2019,1,4]]},"reference":[{"doi-asserted-by":"publisher","key":"e_1_3_2_1_1_1","DOI":"10.1145\/1089761.1089777"},{"key":"e_1_3_2_1_2_1","volume-title":"Understanding PKI: Concepts, Standards, and Deployment Considerations","author":"Adams Carlisle","unstructured":"Carlisle Adams and Steve Lloyd . 2002. Understanding PKI: Concepts, Standards, and Deployment Considerations ( 2 nd ed.). Addison-Wesley Longman Publishing Co., Inc. , Boston, MA, USA . Carlisle Adams and Steve Lloyd. 2002. Understanding PKI: Concepts, Standards, and Deployment Considerations (2nd ed.). Addison-Wesley Longman Publishing Co., Inc., Boston, MA, USA.","edition":"2"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_3_1","DOI":"10.1109\/JIOT.2017.2757918"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_4_1","DOI":"10.1016\/S0140-3664(00)00249-8"},{"volume-title":"NDSS. Network and Distributed System Security Symposium, San Diego; CA; USA., 13","author":"Balfanz Dirk","unstructured":"Dirk Balfanz , Diana K. Smetters , Paul Stewart , and H. Chi Wong . 2002. Talking to Strangers: Authentication in Ad-Hoc Wireless Networks . In NDSS. Network and Distributed System Security Symposium, San Diego; CA; USA., 13 . Dirk Balfanz, Diana K. Smetters, Paul Stewart, and H. Chi Wong. 2002. Talking to Strangers: Authentication in Ad-Hoc Wireless Networks. In NDSS. Network and Distributed System Security Symposium, San Diego; CA; USA., 13.","key":"e_1_3_2_1_5_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_6_1","DOI":"10.17487\/RFC3711"},{"key":"e_1_3_2_1_7_1","first-page":"216","article-title":"Method and apparatus for managing thread execution in a multithread application. (May 8 2007)","volume":"7","author":"Bender Ernest S","year":"2007","unstructured":"Ernest S Bender and Chun-Kwan K Yee . 2007 . Method and apparatus for managing thread execution in a multithread application. (May 8 2007) . US Patent 7 , 216 ,346. Ernest S Bender and Chun-Kwan K Yee. 2007. Method and apparatus for managing thread execution in a multithread application. (May 8 2007). US Patent 7,216,346.","journal-title":"US Patent"},{"key":"e_1_3_2_1_8_1","first-page":"18","article-title":"Design Patterns as Language Constructs","volume":"11","author":"Bosch Jan","year":"1998","unstructured":"Jan Bosch . 1998 . Design Patterns as Language Constructs . Journal of Object-Oriented Programming 11 (1998), 18 -- 32 . Jan Bosch. 1998. Design Patterns as Language Constructs. Journal of Object-Oriented Programming 11 (1998), 18--32.","journal-title":"Journal of Object-Oriented Programming"},{"unstructured":"Bill Brenner. 2017. Let's Encrypt issues certs to 'PayPal' phishing sites: how to protect yourself (2017)). (2017). http:\/\/bit.ly\/2i7Z4bT http:\/\/bit.ly\/2i7Z4bT {Online; Accessed 19-05-2017}.  Bill Brenner. 2017. Let's Encrypt issues certs to 'PayPal' phishing sites: how to protect yourself (2017)). (2017). http:\/\/bit.ly\/2i7Z4bT http:\/\/bit.ly\/2i7Z4bT {Online; Accessed 19-05-2017}.","key":"e_1_3_2_1_9_1"},{"key":"e_1_3_2_1_10_1","volume-title":"Veldhuis","author":"Buhan I.R.","year":"2006","unstructured":"I.R. Buhan , J.M. Doumen , Pieter H. Hartel , and Raymond N.J . Veldhuis . 2006 . Feeling is Believing: a location limited channel based on grip pattern biometrics and cryptanalysis. Number 06-29 in CTIT technical reports series. Centrum voor Telematica en Informatie Technologie, Centrum voor Telematica en Informatie Technologie. Imported from CTIT. I.R. Buhan, J.M. Doumen, Pieter H. Hartel, and Raymond N.J. Veldhuis. 2006. Feeling is Believing: a location limited channel based on grip pattern biometrics and cryptanalysis. Number 06-29 in CTIT technical reports series. Centrum voor Telematica en Informatie Technologie, Centrum voor Telematica en Informatie Technologie. Imported from CTIT."},{"key":"e_1_3_2_1_11_1","volume-title":"Device Pairing Using Short Authentication Strings. (2016). https:\/\/github.com\/jitsi\/zrtp4j https:\/\/tools.ietf.org\/html\/draft-ietf-dnssd-pairing-01, {Online","author":"Daniel Kaiser Christian Huitema","year":"2017","unstructured":"Christian Huitema Daniel Kaiser . 2016. Device Pairing Using Short Authentication Strings. (2016). https:\/\/github.com\/jitsi\/zrtp4j https:\/\/tools.ietf.org\/html\/draft-ietf-dnssd-pairing-01, {Online ; Accessed 21-04- 2017 }. Christian Huitema Daniel Kaiser. 2016. Device Pairing Using Short Authentication Strings. (2016). https:\/\/github.com\/jitsi\/zrtp4j https:\/\/tools.ietf.org\/html\/draft-ietf-dnssd-pairing-01, {Online; Accessed 21-04-2017}."},{"key":"e_1_3_2_1_12_1","volume-title":"https:\/\/www.raspbian.org\/ https:\/\/www.raspbian.org\/ {Online","author":"Developers Raspbian","year":"2018","unstructured":"Raspbian Developers . 2018. Raspbian. ( 2018 ). https:\/\/www.raspbian.org\/ https:\/\/www.raspbian.org\/ {Online ; Accessed 16-06-2018}. Raspbian Developers. 2018. Raspbian. (2018). https:\/\/www.raspbian.org\/ https:\/\/www.raspbian.org\/ {Online; Accessed 16-06-2018}."},{"key":"e_1_3_2_1_13_1","volume-title":"https:\/\/github.com\/wernerd\/ZRTPCPP https:\/\/github.com\/wernerd\/ZRTPCPP {Online","author":"Dittmann Werner","year":"2018","unstructured":"Werner Dittmann . 2018. ZRTPCPP. ( 2018 ). https:\/\/github.com\/wernerd\/ZRTPCPP https:\/\/github.com\/wernerd\/ZRTPCPP {Online ; Accessed 16-06-2018}. Werner Dittmann. 2018. ZRTPCPP. (2018). https:\/\/github.com\/wernerd\/ZRTPCPP https:\/\/github.com\/wernerd\/ZRTPCPP {Online; Accessed 16-06-2018}."},{"key":"e_1_3_2_1_14_1","volume-title":"GNU ccRTP. (2018). https:\/\/www.gnu.org\/software\/ccrtp\/ https:\/\/www.gnu.org\/software\/ccrtp\/ {Online","author":"Software Foundation Inc Free","year":"2018","unstructured":"Inc Free Software Foundation . 2018. GNU ccRTP. (2018). https:\/\/www.gnu.org\/software\/ccrtp\/ https:\/\/www.gnu.org\/software\/ccrtp\/ {Online ; Accessed 16-06- 2018 }. Inc Free Software Foundation. 2018. GNU ccRTP. (2018). https:\/\/www.gnu.org\/software\/ccrtp\/ https:\/\/www.gnu.org\/software\/ccrtp\/ {Online; Accessed 16-06-2018}."},{"key":"e_1_3_2_1_15_1","volume-title":"https:\/\/www.gnu.org\/software\/commoncpp\/ https:\/\/www.gnu.org\/software\/commoncpp\/ {Online","author":"Software Foundation Inc Free","year":"2018","unstructured":"Inc Free Software Foundation . 2018. GNU {u}Common C++. ( 2018 ). https:\/\/www.gnu.org\/software\/commoncpp\/ https:\/\/www.gnu.org\/software\/commoncpp\/ {Online ; Accessed 16-06-2018}. Inc Free Software Foundation. 2018. GNU {u}Common C++. (2018). https:\/\/www.gnu.org\/software\/commoncpp\/ https:\/\/www.gnu.org\/software\/commoncpp\/ {Online; Accessed 16-06-2018}."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_16_1","DOI":"10.1016\/j.future.2013.01.010"},{"key":"e_1_3_2_1_17_1","volume-title":"Schnorr NIZK Proof: Non-interactive Zero Knowledge Proof for Discrete Logarithm version 5. Online}. Tersedia: https:\/\/tools.ietf.org\/html\/draft-hao-schnorr-05","author":"Hao F","year":"2016","unstructured":"F Hao . 2016. Schnorr NIZK Proof: Non-interactive Zero Knowledge Proof for Discrete Logarithm version 5. Online}. Tersedia: https:\/\/tools.ietf.org\/html\/draft-hao-schnorr-05 ( 2016 ). F Hao. 2016. Schnorr NIZK Proof: Non-interactive Zero Knowledge Proof for Discrete Logarithm version 5. Online}. Tersedia: https:\/\/tools.ietf.org\/html\/draft-hao-schnorr-05 (2016)."},{"doi-asserted-by":"crossref","unstructured":"Feng Hao. 2017. J-PAKE: Password-Authenticated Key Exchange by Juggling. (2017).  Feng Hao. 2017. J-PAKE: Password-Authenticated Key Exchange by Juggling. (2017).","key":"e_1_3_2_1_18_1","DOI":"10.17487\/RFC8236"},{"key":"e_1_3_2_1_19_1","volume-title":"International Workshop on Security Protocols. Springer, 159--171","author":"Hao Feng","year":"2008","unstructured":"Feng Hao and Peter YA Ryan . 2008 . Password authenticated key exchange by juggling . In International Workshop on Security Protocols. Springer, 159--171 . Feng Hao and Peter YA Ryan. 2008. Password authenticated key exchange by juggling. In International Workshop on Security Protocols. Springer, 159--171."},{"key":"e_1_3_2_1_20_1","first-page":"499","article-title":"Multiplex server system and server multiplexing method. (Sept. 20 2007)","volume":"11","author":"Isoyama Kazuhiko","year":"2007","unstructured":"Kazuhiko Isoyama . 2007 . Multiplex server system and server multiplexing method. (Sept. 20 2007) . US Patent App. 11\/723 , 499 . Kazuhiko Isoyama. 2007. Multiplex server system and server multiplexing method. (Sept. 20 2007). US Patent App. 11\/723,499.","journal-title":"US Patent App."},{"volume-title":"zrtp4j. (2018). https:\/\/github.com\/jitsi\/zrtp4j https:\/\/github.com\/jitsi\/zrtp4j {Online","year":"2018","unstructured":"jitsi. 2018. zrtp4j. (2018). https:\/\/github.com\/jitsi\/zrtp4j https:\/\/github.com\/jitsi\/zrtp4j {Online ; Accessed 16-06- 2018 }. jitsi. 2018. zrtp4j. (2018). https:\/\/github.com\/jitsi\/zrtp4j https:\/\/github.com\/jitsi\/zrtp4j {Online; Accessed 16-06-2018}.","key":"e_1_3_2_1_21_1"},{"volume-title":"Providing Robust and Ubiquitous Security Support for Mobile Ad Hoc Networks.. In icnp","author":"Kong Jiejun","unstructured":"Jiejun Kong , Petros Zerfos , Haiyun Luo , Songwu Lu , and Lixia Zhang . 2001. Providing Robust and Ubiquitous Security Support for Mobile Ad Hoc Networks.. In icnp , Vol. 1 . Citeseer , 251--260. Jiejun Kong, Petros Zerfos, Haiyun Luo, Songwu Lu, and Lixia Zhang. 2001. Providing Robust and Ubiquitous Security Support for Mobile Ad Hoc Networks.. In icnp, Vol. 1. Citeseer, 251--260.","key":"e_1_3_2_1_22_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_23_1","DOI":"10.1007\/978-3-319-39555-5_4"},{"key":"e_1_3_2_1_24_1","volume-title":"Session Key Retrieval in J-PAKE Implementations of OpenSSL and OpenSSH. (2010). (2018). https:\/\/github.com\/jitsi\/zrtp4j http:\/\/seb.dbzteam.org\/crypto\/jpake-session-key-retrieval.pdf, {Online","author":"Martini S.","year":"2018","unstructured":"S. Martini . 2018. Session Key Retrieval in J-PAKE Implementations of OpenSSL and OpenSSH. (2010). (2018). https:\/\/github.com\/jitsi\/zrtp4j http:\/\/seb.dbzteam.org\/crypto\/jpake-session-key-retrieval.pdf, {Online ; Accessed 16-06- 2018 }. S. Martini. 2018. Session Key Retrieval in J-PAKE Implementations of OpenSSL and OpenSSH. (2010). (2018). https:\/\/github.com\/jitsi\/zrtp4j http:\/\/seb.dbzteam.org\/crypto\/jpake-session-key-retrieval.pdf, {Online; Accessed 16-06-2018}."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_25_1","DOI":"10.1016\/j.adhoc.2015.01.006"},{"volume-title":"The pigpio library","year":"2012","unstructured":"pigpio. 2018. The pigpio library ( 2012 ). http:\/\/abyz.me.uk\/rpi\/pigpio\/index.html. (2018). {Online; Accessed 31-07-2018}. pigpio. 2018. The pigpio library (2012). http:\/\/abyz.me.uk\/rpi\/pigpio\/index.html. (2018). {Online; Accessed 31-07-2018}.","key":"e_1_3_2_1_26_1"},{"unstructured":"Jon Postel. 1981. Transmission Control Protocol. STD 7. RFC Editor. http:\/\/www.rfc-editor.org\/rfc\/rfc793.txt http:\/\/www.rfc-editor.org\/rfc\/rfc793.txt.  Jon Postel. 1981. Transmission Control Protocol . STD 7. RFC Editor. http:\/\/www.rfc-editor.org\/rfc\/rfc793.txt http:\/\/www.rfc-editor.org\/rfc\/rfc793.txt.","key":"e_1_3_2_1_27_1"},{"key":"e_1_3_2_1_28_1","volume-title":"Evaluating the Privacy Properties of Secure VoIP Metadata. In International Conference on Trust and Privacy in Digital Business. Springer, 57--68","author":"Resende Jo\u00e3o S","year":"2018","unstructured":"Jo\u00e3o S Resende , Patr\u00edcia R Sousa , and Lu\u00eds Antunes . 2018 . Evaluating the Privacy Properties of Secure VoIP Metadata. In International Conference on Trust and Privacy in Digital Business. Springer, 57--68 . Jo\u00e3o S Resende, Patr\u00edcia R Sousa, and Lu\u00eds Antunes. 2018. Evaluating the Privacy Properties of Secure VoIP Metadata. In International Conference on Trust and Privacy in Digital Business. Springer, 57--68."},{"key":"e_1_3_2_1_29_1","volume-title":"CVE-ID CVE-2016-6271.. (Feb.","author":"Sch\u00fcrmann Dominik","year":"2016","unstructured":"Dominik Sch\u00fcrmann , Fabian Kabus , Gregor Hildermeier , and Lars Wolf . 2016. CVE-2016-6271. Available from MITRE , CVE-ID CVE-2016-6271.. (Feb. 2016 ). https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2016-6271 https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2016-6271 {Online; Accessed 16-06-2018}. Dominik Sch\u00fcrmann, Fabian Kabus, Gregor Hildermeier, and Lars Wolf. 2016. CVE-2016-6271. Available from MITRE, CVE-ID CVE-2016-6271.. (Feb. 2016). https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2016-6271 https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2016-6271 {Online; Accessed 16-06-2018}."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_30_1","DOI":"10.1049\/el:19990724"},{"key":"e_1_3_2_1_31_1","volume-title":"https:\/\/github.com\/SilentCircle\/ZRTPCPP https:\/\/github.com\/SilentCircle\/ZRTPCPP {Online","author":"ZRTPCPP.","year":"2018","unstructured":"SilentCircle. 2018. ZRTPCPP. ( 2018 ). https:\/\/github.com\/SilentCircle\/ZRTPCPP https:\/\/github.com\/SilentCircle\/ZRTPCPP {Online ; Accessed 16-06-2018}. SilentCircle. 2018. ZRTPCPP. (2018). https:\/\/github.com\/SilentCircle\/ZRTPCPP https:\/\/github.com\/SilentCircle\/ZRTPCPP {Online; Accessed 16-06-2018}."},{"volume-title":"SIP security","author":"Sisalem Dorgham","unstructured":"Dorgham Sisalem , John Floroiu , Jiri Kuthan , Ulrich Abend , and Henning Schulzrinne . 2009. SIP security . John Wiley & Sons . Dorgham Sisalem, John Floroiu, Jiri Kuthan, Ulrich Abend, and Henning Schulzrinne. 2009. SIP security. John Wiley & Sons.","key":"e_1_3_2_1_32_1"},{"volume-title":"Privacy, Security and Trust within the Context of Pervasive Computing","author":"Spahi\u0107 Amir","unstructured":"Amir Spahi\u0107 , Michael Kreutzer , Martin K\u00e4hmer , and Sumith Chandratilleke . 2005. Pre-authentication using infrared . In Privacy, Security and Trust within the Context of Pervasive Computing . Springer , 105--112. Amir Spahi\u0107, Michael Kreutzer, Martin K\u00e4hmer, and Sumith Chandratilleke. 2005. Pre-authentication using infrared. In Privacy, Security and Trust within the Context of Pervasive Computing. Springer, 105--112.","key":"e_1_3_2_1_33_1"},{"volume-title":"Securing VoIP Networks: Threats, Vulnerabilities, and Countermeasures","author":"Thermos Peter","unstructured":"Peter Thermos and Ari Takanen . 2007. Securing VoIP Networks: Threats, Vulnerabilities, and Countermeasures . Addison-Wesley Professional . Peter Thermos and Ari Takanen. 2007. Securing VoIP Networks: Threats, Vulnerabilities, and Countermeasures. Addison-Wesley Professional.","key":"e_1_3_2_1_34_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_35_1","DOI":"10.1109\/ISCC.2014.6912576"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_36_1","DOI":"10.1007\/11535218_19"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_37_1","DOI":"10.17487\/RFC6189"},{"key":"e_1_3_2_1_38_1","volume-title":"ZRTP: Media path key agreement for unicast secure RTP.","author":"Zimmermann Phil","year":"2011","unstructured":"Phil Zimmermann , Alan Johnston , and Jon Callas . 2011 . ZRTP: Media path key agreement for unicast secure RTP. (2011). Phil Zimmermann, Alan Johnston, and Jon Callas. 2011. ZRTP: Media path key agreement for unicast secure RTP. (2011)."}],"event":{"sponsor":["SIGOPS ACM Special Interest Group on Operating Systems","Indian Institute of Science Indian Institute of Science","ACM Association for Computing Machinery"],"acronym":"ICDCN '19","name":"ICDCN '19: International Conference on Distributed Computing and Networking","location":"Bangalore India"},"container-title":["Proceedings of the 20th International Conference on Distributed Computing and Networking"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3288599.3288623","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3288599.3288623","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:57:46Z","timestamp":1750208266000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3288599.3288623"}},"subtitle":["trustable autonomous secure communications"],"short-title":[],"issued":{"date-parts":[[2019,1,4]]},"references-count":38,"alternative-id":["10.1145\/3288599.3288623","10.1145\/3288599"],"URL":"https:\/\/doi.org\/10.1145\/3288599.3288623","relation":{},"subject":[],"published":{"date-parts":[[2019,1,4]]},"assertion":[{"value":"2019-01-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}