{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T18:41:38Z","timestamp":1771699298937,"version":"3.50.1"},"reference-count":31,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007,7]]},"DOI":"10.1109\/csf.2007.31","type":"proceedings-article","created":{"date-parts":[[2007,7,23]],"date-time":"2007-07-23T20:33:26Z","timestamp":1185222806000},"page":"49-63","source":"Crossref","is-referenced-by-count":44,"title":["Security Analysis of Voice-over-IP Protocols"],"prefix":"10.1109","author":[{"given":"Prateek","family":"Gupta","sequence":"first","affiliation":[]},{"given":"Vitaly","family":"Shmatikov","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","first-page":"147","article-title":"SIP security mechanisms: A state-of-the-art review","author":"geneiatakis","year":"2005","journal-title":"Proc 5th International Network Conference (INC)"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.17487\/rfc2617"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.17487\/rfc1847"},{"key":"15","year":"0"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.17487\/rfc4650"},{"key":"13","article-title":"A high level protocol specification language for industrial security-sensitive protocols","author":"chevalier","year":"2004","journal-title":"Proc Workshop on Specification and Automated Processing of Security Requirements (SAPS)"},{"key":"14","doi-asserted-by":"crossref","first-page":"423","DOI":"10.3233\/JCS-2005-13304","article-title":"A derivation system and compositional logic for security protocols","volume":"13","author":"datta","year":"2005","journal-title":"J Computer Security"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1145\/381677.381695"},{"key":"12","first-page":"453","article-title":"Analysis of key-exchange protocols and their use for building secure channels","volume":"2045","author":"canetti","year":"2001","journal-title":"LNCS"},{"key":"21","author":"harkins","year":"2006","journal-title":"The Internet key exchange (IKE)"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.17487\/rfc2327"},{"key":"22","article-title":"Security considerations for Voice Over IP systems","volume":"800 58","author":"kuhn","year":"2005","journal-title":"NIST SP"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44983-3_2"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1145\/73007.73011"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.17487\/rfc2633"},{"key":"26","author":"rosenberg","year":"2001","journal-title":"SIP traversal through residential and enterprise NATs and firewalls"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.17487\/rfc3261"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.17487\/rfc3550"},{"key":"29","year":"0"},{"key":"3","year":"2006","journal-title":"The AVISPA project"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.17487\/rfc3830"},{"key":"10","author":"biondi","year":"2006","journal-title":"Silver needle in the Skype"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.17487\/rfc4568"},{"key":"30","year":"2006","journal-title":"Zfone The Zfone Project"},{"key":"7","author":"baugher","year":"2005","journal-title":"Secure RTP Frequently Asked Questions"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.17487\/rfc3711"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2006.312"},{"key":"31","author":"zimmermann","year":"2006","journal-title":"ZRTP Extensions to RTP for Diffie-Hellman Key Agreement for SRTP"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1145\/948109.948140"},{"key":"9","author":"berson","year":"2005","journal-title":"Skype Security Evaluation"},{"key":"8","first-page":"232","article-title":"Entity authentication and key distribution","volume":"773","author":"bellare","year":"1993","journal-title":"LNCS"}],"event":{"name":"20th IEEE Computer Security Foundations Symposium (CSF'07)","location":"Venice, Italy","start":{"date-parts":[[2007,7,6]]},"end":{"date-parts":[[2007,7,8]]}},"container-title":["20th IEEE Computer Security Foundations Symposium (CSF'07)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4271630\/4271631\/04271640.pdf?arnumber=4271640","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,1]],"date-time":"2019-05-01T11:59:24Z","timestamp":1556711964000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4271640\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,7]]},"references-count":31,"URL":"https:\/\/doi.org\/10.1109\/csf.2007.31","relation":{},"ISSN":["1063-6900"],"issn-type":[{"value":"1063-6900","type":"print"}],"subject":[],"published":{"date-parts":[[2007,7]]}}}