{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,15]],"date-time":"2026-05-15T01:25:54Z","timestamp":1778808354143,"version":"3.51.4"},"reference-count":18,"publisher":"Engineering and Technology Publishing","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["jcm"],"published-print":{"date-parts":[[2018]]},"DOI":"10.12720\/jcm.13.8.450-455","type":"journal-article","created":{"date-parts":[[2019,10,29]],"date-time":"2019-10-29T06:02:52Z","timestamp":1572328972000},"page":"450-455","source":"Crossref","is-referenced-by-count":13,"title":["Secure End-to-End VoIP System Based on Ethereum Blockchain"],"prefix":"10.12720","author":[{"name":"Computer Science Department, American University of Science and Technology, Lebanon","sequence":"first","affiliation":[]},{"given":"Elie F.","family":"Kfoury","sequence":"first","affiliation":[]},{"given":"David J.","family":"Khoury","sequence":"additional","affiliation":[]}],"member":"4977","published-online":{"date-parts":[[2018]]},"reference":[{"key":"ref0","unstructured":"[1] C. Osborne. (2017). VoIPtalk admits to possible data breach | ZDNet. [Online]. Available: http:\/\/www.zdnet.com\/article\/voiptalk-admits-to-possibledata-breach\/"},{"key":"ref1","unstructured":"[2] Understanding Ethereum (Report). CoinDesk. June 24, 2016."},{"key":"ref2","unstructured":"[3] RFC 2617 - IETF. HTTP Authentication: Basic and Digest Access Authentication."},{"key":"ref3","unstructured":"[4] RFC 6071 - IETF. IP Security (IPsec) and Internet Key Exchange."},{"key":"ref4","unstructured":"[5] RFC 5751 - IETF. Secure\/Multipurpose Internet Mail Extensions."},{"key":"ref5","unstructured":"[6] RFC 4566 - IETF: Session Description Protocol."},{"key":"ref6","unstructured":"[7] RFC 3711 - IETF: The Secure Real-time Transport Protocol."},{"key":"ref7","unstructured":"[8] Ethereum. Light client protocol. Ethereum Wiki. (May 2016). [Online]. Available: https:\/\/github.com\/ethereum\/wiki\/wiki\/Light-clientprotocol"},{"key":"ref8","unstructured":"[9] Solidity Language. [Online]. Available: http:\/\/solidity.readthedocs.io\/en\/latest\/"},{"key":"ref9","unstructured":"[10] Ethereum Blog. (2017). Merkling in Ethereum - Ethereum Blog. [Online]. Available: https:\/\/blog.ethereum.org\/2015\/11\/15\/merkling-inethereum\/"},{"key":"ref10","unstructured":"[11] R. C. Merkle, \"Method of providing digital signatures,\" U.S Patent US4309569, Jan. 5, 1982."},{"key":"ref11","doi-asserted-by":"publisher","unstructured":"[12] R. M. Needham and M. D. Schroeder, \"Using encryption for authentication in large networks of computers,\" Communications of the ACM, vol. 21, no. 12, pp. 993-999, Dec. 1978.","DOI":"10.1145\/359657.359659"},{"key":"ref12","doi-asserted-by":"publisher","unstructured":"[13] S. Blake-Wilson and A. Menezes, \"Unknown key-share attacks on the Station-to-Station (STS) protocol,\" in Public Key Cryptography, Lecture Notes in Computer Science, 1560, Springer, 1999, pp. 154-170.","DOI":"10.1007\/3-540-49162-7_12"},{"key":"ref13","unstructured":"[14] RFC 6642 - IETF. RTP Control Protocol (RTCP) Extension for a Third-Party Loss Report."},{"key":"ref14","unstructured":"[15] Kamailio. The Kamailio SIP Server Project [Online]. Available: https:\/\/www.kamailio.org"},{"key":"ref15","unstructured":"[16] Ethdroid. Easy-to-use Ethereum Geth Wrapper for Android. [Online]. Available: https:\/\/github.com\/ethmobile\/ethdroid"},{"key":"ref16","unstructured":"[17] Sipdroid. Free SIP\/VoIP Client for Android. [Online]. Available: http:\/\/sipdroid.org\/"},{"key":"ref17","doi-asserted-by":"publisher","unstructured":"[18] D. Khoury and E. Kfoury, \"Generic hybrid methods for secure connections based on the integration of GBA and TLS\/CA,\" in Sensors Networks Smart and Emerging Technologies, 2017, pp. 1-4.","DOI":"10.1109\/SENSET.2017.8125033"}],"container-title":["Journal of Communications"],"original-title":[],"link":[{"URL":"http:\/\/www.jocm.us\/uploadfile\/2018\/0817\/20180817033654165.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,12,30]],"date-time":"2020-12-30T02:27:03Z","timestamp":1609295223000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.jocm.us\/index.php?m=content&c=index&a=show&catid=194&id=1243"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"references-count":18,"URL":"https:\/\/doi.org\/10.12720\/jcm.13.8.450-455","relation":{},"ISSN":["2374-4367"],"issn-type":[{"value":"2374-4367","type":"print"}],"subject":[],"published":{"date-parts":[[2018]]}}}