{"id":"https://openalex.org/W2899908369","doi":"https://doi.org/10.1109/idaacs-sws.2018.8525847","title":"Integrity and Non-repudiation of VoIP Streams with TPM2.0 over Wi-Fi Networks","display_name":"Integrity and Non-repudiation of VoIP Streams with TPM2.0 over Wi-Fi Networks","publication_year":2018,"publication_date":"2018-09-01","ids":{"openalex":"https://openalex.org/W2899908369","doi":"https://doi.org/10.1109/idaacs-sws.2018.8525847","mag":"2899908369"},"language":"en","primary_location":{"id":"doi:10.1109/idaacs-sws.2018.8525847","is_oa":false,"landing_page_url":"https://doi.org/10.1109/idaacs-sws.2018.8525847","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 IEEE 4th International Symposium on Wireless Systems within the International Conferences on Intelligent Data Acquisition and Advanced Computing Systems (IDAACS-SWS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5041883245","display_name":"Kai-Oliver Detken","orcid":null},"institutions":[{"id":"https://openalex.org/I4210106809","display_name":"Institute for Applied Systems Technology Bremen","ror":"https://ror.org/01vg8sr12","country_code":"DE","type":"facility","lineage":["https://openalex.org/I4210106809"]}],"countries":["DE"],"is_corresponding":true,"raw_author_name":"Kai-Oliver Detken","raw_affiliation_strings":["DECOIT GmbH, Bremen"],"affiliations":[{"raw_affiliation_string":"DECOIT GmbH, Bremen","institution_ids":["https://openalex.org/I4210106809"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5026690093","display_name":"Marcel Jahnke","orcid":null},"institutions":[{"id":"https://openalex.org/I4210106809","display_name":"Institute for Applied Systems Technology Bremen","ror":"https://ror.org/01vg8sr12","country_code":"DE","type":"facility","lineage":["https://openalex.org/I4210106809"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Marcel Jahnke","raw_affiliation_strings":["DECOIT GmbH, Bremen"],"affiliations":[{"raw_affiliation_string":"DECOIT GmbH, Bremen","institution_ids":["https://openalex.org/I4210106809"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5060432276","display_name":"Malte Humann","orcid":null},"institutions":[{"id":"https://openalex.org/I4210106809","display_name":"Institute for Applied Systems Technology Bremen","ror":"https://ror.org/01vg8sr12","country_code":"DE","type":"facility","lineage":["https://openalex.org/I4210106809"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Malte Humann","raw_affiliation_strings":["DECOIT GmbH, Bremen"],"affiliations":[{"raw_affiliation_string":"DECOIT GmbH, Bremen","institution_ids":["https://openalex.org/I4210106809"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5049875991","display_name":"Bernd Rollgen","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Bernd Rollgen","raw_affiliation_strings":["Global IP Telecommunications Ltd., Sch\u00f6ffengrund"],"affiliations":[{"raw_affiliation_string":"Global IP Telecommunications Ltd., Sch\u00f6ffengrund","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5041883245"],"corresponding_institution_ids":["https://openalex.org/I4210106809"],"apc_list":null,"apc_paid":null,"fwci":0.1629,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.60001446,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"82","last_page":"87"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9980000257492065,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9980000257492065,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9972000122070312,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9962999820709229,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/eavesdropping","display_name":"Eavesdropping","score":0.8486790060997009},{"id":"https://openalex.org/keywords/voice-over-ip","display_name":"Voice over IP","score":0.8456494212150574},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7411426901817322},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.6833394169807434},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6706717014312744},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5655291080474854},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.5582848787307739},{"id":"https://openalex.org/keywords/digital-signature","display_name":"Digital signature","score":0.4821060001850128},{"id":"https://openalex.org/keywords/mobile-communications-over-ip","display_name":"Mobile communications over IP","score":0.4802020788192749},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.47058218717575073},{"id":"https://openalex.org/keywords/ipsec","display_name":"IPsec","score":0.46003660559654236},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.4550505578517914},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.3094829022884369},{"id":"https://openalex.org/keywords/mobile-telephony","display_name":"Mobile telephony","score":0.1644214391708374},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.11705070734024048}],"concepts":[{"id":"https://openalex.org/C2776788033","wikidata":"https://www.wikidata.org/wiki/Q320769","display_name":"Eavesdropping","level":2,"score":0.8486790060997009},{"id":"https://openalex.org/C171246234","wikidata":"https://www.wikidata.org/wiki/Q81945","display_name":"Voice over IP","level":3,"score":0.8456494212150574},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7411426901817322},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.6833394169807434},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6706717014312744},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5655291080474854},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.5582848787307739},{"id":"https://openalex.org/C118463975","wikidata":"https://www.wikidata.org/wiki/Q220849","display_name":"Digital signature","level":3,"score":0.4821060001850128},{"id":"https://openalex.org/C207438416","wikidata":"https://www.wikidata.org/wiki/Q6887084","display_name":"Mobile communications over IP","level":5,"score":0.4802020788192749},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.47058218717575073},{"id":"https://openalex.org/C67396069","wikidata":"https://www.wikidata.org/wiki/Q210214","display_name":"IPsec","level":3,"score":0.46003660559654236},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.4550505578517914},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.3094829022884369},{"id":"https://openalex.org/C95491727","wikidata":"https://www.wikidata.org/wiki/Q992968","display_name":"Mobile telephony","level":3,"score":0.1644214391708374},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.11705070734024048},{"id":"https://openalex.org/C36800599","wikidata":"https://www.wikidata.org/wiki/Q915808","display_name":"Public land mobile network","level":4,"score":0.0},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.0},{"id":"https://openalex.org/C2781307350","wikidata":"https://www.wikidata.org/wiki/Q6887221","display_name":"Mobile radio","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/idaacs-sws.2018.8525847","is_oa":false,"landing_page_url":"https://doi.org/10.1109/idaacs-sws.2018.8525847","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 IEEE 4th International Symposium on Wireless Systems within the International Conferences on Intelligent Data Acquisition and Advanced Computing Systems (IDAACS-SWS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":6,"referenced_works":["https://openalex.org/W1561697831","https://openalex.org/W2030511439","https://openalex.org/W2049227397","https://openalex.org/W2311411768","https://openalex.org/W4214859749","https://openalex.org/W4254098104"],"related_works":["https://openalex.org/W2072065756","https://openalex.org/W2741704743","https://openalex.org/W3110893632","https://openalex.org/W898799426","https://openalex.org/W2168854337","https://openalex.org/W2286796846","https://openalex.org/W3093504773","https://openalex.org/W211017900","https://openalex.org/W2152060485","https://openalex.org/W2963739694"],"abstract_inverted_index":{"The":[0,19,117,141,154],"complete":[1],"digitization":[2],"of":[3,57,102,108,119,128,147,166],"telecommunications":[4],"allows":[5],"new":[6],"attack":[7],"scenarios,":[8],"which":[9,41,81,134],"have":[10],"not":[11,72],"been":[12,96],"possible":[13,160],"with":[14,98,151,172],"legacy":[15,26],"phone":[16,27],"technologies":[17,28],"before.":[18],"reason":[20],"is":[21,67,71,76,122,156,159,176],"that":[22,89],"physical":[23],"access":[24],"to":[25,79,85,161,181],"was":[29],"necessary.":[30],"Regarding":[31],"internet-based":[32],"communication":[33,59,111],"like":[34,60],"voice":[35],"over":[36],"the":[37,91,99,123,129,163,167],"internet":[38],"protocol":[39],"(VoIP),":[40],"can":[42,49],"be":[43,144],"established":[44],"between":[45],"random":[46],"nodes,":[47],"eavesdropping":[48],"happen":[50],"everywhere":[51],"and":[52,106],"much":[53],"easier.":[54],"Additionally,":[55],"injection":[56],"undesirable":[58],"SPAM":[61],"or":[62],"SPIT":[63],"in":[64,169],"digital":[65,115],"networks":[66],"simpler,":[68],"too.":[69],"Encryption":[70],"sufficient":[73],"because":[74],"it":[75,158],"also":[77],"necessary":[78],"know":[80],"participants":[82],"are":[83],"talking":[84],"each":[86],"other.":[87],"For":[88],"reason,":[90],"research":[92],"project":[93,168],"INTEGER":[94],"has":[95],"started":[97],"main":[100,164],"goals":[101,165],"providing":[103],"secure":[104],"authentication":[105],"integrity":[107],"a":[109,114,137],"VoIP":[110,152],"by":[112],"using":[113],"signature.":[116],"basis":[118],"this":[120,178],"approach":[121],"Trusted":[124,130],"Platform":[125],"Module":[126],"(TPM)":[127],"Computing":[131],"Group":[132],"(TCG)":[133],"works":[135],"as":[136],"hardware-based":[138],"trusted":[139],"anchor.":[140],"TPM":[142],"will":[143],"used":[145],"inside":[146],"wireless":[148,170],"IP":[149],"devices":[150],"softphones.":[153],"question":[155],"if":[157],"fulfill":[162],"scenarios":[171],"Wi-Fi":[173],"technologies.":[174],"That":[175],"what":[177],"contribution":[179],"aims":[180],"clarify.":[182]},"counts_by_year":[{"year":2018,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
