{"id":"https://openalex.org/W4229816125","doi":"https://doi.org/10.1145/2589649.2554669","title":"Bringing VoIP Signatures to Mobile Devices","display_name":"Bringing VoIP Signatures to Mobile Devices","publication_year":2013,"publication_date":"2013-10-15","ids":{"openalex":"https://openalex.org/W4229816125","doi":"https://doi.org/10.1145/2589649.2554669"},"language":"en","primary_location":{"id":"doi:10.1145/2589649.2554669","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2589649.2554669","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of Principles, Systems and Applications on IP Telecommunications","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5022886678","display_name":"Ronald W. Marx","orcid":null},"institutions":[{"id":"https://openalex.org/I4210133470","display_name":"Fraunhofer Institute for Secure Information Technology","ror":"https://ror.org/03qt2gs44","country_code":"DE","type":"facility","lineage":["https://openalex.org/I4210133470","https://openalex.org/I4923324"]}],"countries":["DE"],"is_corresponding":true,"raw_author_name":"Ronald Marx","raw_affiliation_strings":["Fraunhofer Institute for Secure Information Technology SIT, Darmstadt, Germany"],"affiliations":[{"raw_affiliation_string":"Fraunhofer Institute for Secure Information Technology SIT, Darmstadt, Germany","institution_ids":["https://openalex.org/I4210133470"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5088988377","display_name":"Nicolai Kuntze","orcid":null},"institutions":[{"id":"https://openalex.org/I4210133470","display_name":"Fraunhofer Institute for Secure Information Technology","ror":"https://ror.org/03qt2gs44","country_code":"DE","type":"facility","lineage":["https://openalex.org/I4210133470","https://openalex.org/I4923324"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Nicolai Kuntze","raw_affiliation_strings":["Fraunhofer Institute for Secure Information Technology SIT, Darmstadt, Germany"],"affiliations":[{"raw_affiliation_string":"Fraunhofer Institute for Secure Information Technology SIT, Darmstadt, Germany","institution_ids":["https://openalex.org/I4210133470"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5067051851","display_name":"Hagen Lauer","orcid":"https://orcid.org/0000-0001-6901-8303"},"institutions":[{"id":"https://openalex.org/I45155027","display_name":"Technische Hochschule Mittelhessen","ror":"https://ror.org/02qdc9985","country_code":"DE","type":"education","lineage":["https://openalex.org/I45155027"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Hagen Lauer","raw_affiliation_strings":["Technische Hochschule Mittelhessen, Gie\u00dfen, Germany"],"affiliations":[{"raw_affiliation_string":"Technische Hochschule Mittelhessen, Gie\u00dfen, Germany","institution_ids":["https://openalex.org/I45155027"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5022886678"],"corresponding_institution_ids":["https://openalex.org/I4210133470"],"apc_list":null,"apc_paid":null,"fwci":0.3625,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.71671213,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"7"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10651","display_name":"IPv6, Mobility, Handover, Networks, Security","score":0.9977999925613403,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.963699996471405,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/voice-over-ip","display_name":"Voice over IP","score":0.9097295999526978},{"id":"https://openalex.org/keywords/mobile-phone","display_name":"Mobile phone","score":0.6755273938179016},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6279988884925842},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6164745688438416},{"id":"https://openalex.org/keywords/confidentiality","display_name":"Confidentiality","score":0.5801831483840942},{"id":"https://openalex.org/keywords/mobile-telephony","display_name":"Mobile telephony","score":0.546602725982666},{"id":"https://openalex.org/keywords/mobile-communications-over-ip","display_name":"Mobile communications over IP","score":0.5020942687988281},{"id":"https://openalex.org/keywords/voice-communication","display_name":"Voice communication","score":0.43290114402770996},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.43159565329551697},{"id":"https://openalex.org/keywords/phone","display_name":"Phone","score":0.41805779933929443},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.40696048736572266},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.39399009943008423},{"id":"https://openalex.org/keywords/mobile-radio","display_name":"Mobile radio","score":0.2523029148578644},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.21573114395141602},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.15692880749702454},{"id":"https://openalex.org/keywords/public-land-mobile-network","display_name":"Public land mobile network","score":0.07758721709251404}],"concepts":[{"id":"https://openalex.org/C171246234","wikidata":"https://www.wikidata.org/wiki/Q81945","display_name":"Voice over IP","level":3,"score":0.9097295999526978},{"id":"https://openalex.org/C2777421447","wikidata":"https://www.wikidata.org/wiki/Q17517","display_name":"Mobile phone","level":2,"score":0.6755273938179016},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6279988884925842},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6164745688438416},{"id":"https://openalex.org/C71745522","wikidata":"https://www.wikidata.org/wiki/Q2476929","display_name":"Confidentiality","level":2,"score":0.5801831483840942},{"id":"https://openalex.org/C95491727","wikidata":"https://www.wikidata.org/wiki/Q992968","display_name":"Mobile telephony","level":3,"score":0.546602725982666},{"id":"https://openalex.org/C207438416","wikidata":"https://www.wikidata.org/wiki/Q6887084","display_name":"Mobile communications over IP","level":5,"score":0.5020942687988281},{"id":"https://openalex.org/C2983306500","wikidata":"https://www.wikidata.org/wiki/Q52946","display_name":"Voice communication","level":2,"score":0.43290114402770996},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.43159565329551697},{"id":"https://openalex.org/C2778707766","wikidata":"https://www.wikidata.org/wiki/Q202064","display_name":"Phone","level":2,"score":0.41805779933929443},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.40696048736572266},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.39399009943008423},{"id":"https://openalex.org/C2781307350","wikidata":"https://www.wikidata.org/wiki/Q6887221","display_name":"Mobile radio","level":2,"score":0.2523029148578644},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.21573114395141602},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.15692880749702454},{"id":"https://openalex.org/C36800599","wikidata":"https://www.wikidata.org/wiki/Q915808","display_name":"Public land mobile network","level":4,"score":0.07758721709251404},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2589649.2554669","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2589649.2554669","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of Principles, Systems and Applications on IP Telecommunications","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.5899999737739563,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":9,"referenced_works":["https://openalex.org/W39220356","https://openalex.org/W1561697831","https://openalex.org/W2032313192","https://openalex.org/W2049227397","https://openalex.org/W2099040451","https://openalex.org/W2121895216","https://openalex.org/W2160862335","https://openalex.org/W6637002316","https://openalex.org/W6805938598"],"related_works":["https://openalex.org/W2977917096","https://openalex.org/W2085099879","https://openalex.org/W2356972668","https://openalex.org/W2489618349","https://openalex.org/W2226242521","https://openalex.org/W2082156502","https://openalex.org/W2091398207","https://openalex.org/W4200037284","https://openalex.org/W2168376376","https://openalex.org/W2634927093"],"abstract_inverted_index":{"With":[0],"the":[1,38,41,62],"advent":[2],"of":[3,29,43,64],"LTE":[4,17,33],"another":[5],"technology":[6],"is":[7,34,50],"gaining":[8],"momentum":[9],"in":[10,67],"mobile":[11,44],"communication,":[12],"viz.":[13],"Voice-over-IP":[14],"(VoIP).":[15],"While":[16],"provides":[18],"state-of-the-art":[19],"security":[20],"features":[21],"such":[22,60],"as":[23,61],"confidentiality,":[24],"integrity,":[25],"and":[26],"authenticity,":[27],"non-repudiation":[28],"voice":[30],"communication":[31,49],"over":[32],"not":[35],"addressed.":[36],"At":[37],"same":[39],"time":[40],"utilization":[42],"phone":[45,69],"devices":[46],"for":[47],"business":[48,58],"already":[51],"common":[52],"practice.":[53],"However,":[54],"applications":[55],"supporting":[56],"specific":[57],"requirements,":[59],"confirmability":[63],"statements":[65],"made":[66],"a":[68],"call,":[70],"are":[71],"missing.":[72]},"counts_by_year":[{"year":2014,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
