{"id":822,"date":"2012-04-30T15:25:38","date_gmt":"2012-04-30T07:25:38","guid":{"rendered":"http:\/\/www.icnalb.cn\/?p=822"},"modified":"2012-04-30T15:25:38","modified_gmt":"2012-04-30T07:25:38","slug":"a-new-approach-to-securing-audio-conference-tools","status":"publish","type":"post","link":"https:\/\/www.icnlab.cn\/?p=822","title":{"rendered":"A New Approach to Securing Audio Conference Tools"},"content":{"rendered":"<p>\u6807\u9898\uff1a<span style=\"font-family: Tahoma;\">A\u00a0New\u00a0Approach\u00a0to\u00a0Securing\u00a0Audio\u00a0Conference\u00a0Tools<\/span><\/p>\n<p style=\"padding-left: 30px;\">( \u6765\u6e90<span style=\"font-family: Tahoma;\">URL<\/span>\uff1a<span style=\"font-family: Tahoma;\"><a href=\"http:\/\/asiafi.net\/org\/ndn\/hands-on2012\/\" target=\"_blank\">http:\/\/asiafi.net\/org\/ndn\/hands-on2012\/<\/a>\u00a0)<\/span><\/p>\n<p>\u7b80\u8981\u8bf4\u660e\uff1a<span style=\"font-family: Tahoma;\">Asia\u00a0Workshop\u00a0on\u00a0Future\u00a0Internet\u00a0Technologies,\u00a0November\u00a02011.<\/span><\/p>\n<p>\u6587\u6863\u65e5\u671f\uff1a<span style=\"font-family: Tahoma;\">2011<\/span><span style=\"font-family: \u5b8b\u4f53;\">\u5e74<\/span>11\u6708\u00a0<span style=\"font-family: Tahoma;\">(November\u00a0,\u00a02011.<\/span>)<\/p>\n<p>\u4f5c\u8005\u4fe1\u606f\uff1a<span style=\"font-family: Tahoma;\">Zhenkai\u00a0Zhu ( <a href=\"mailto:zhenkai@cs.ucla.edu\">zhenkai@cs.ucla.edu<\/a> ),\u00a0Paolo\u00a0Gasti ( <a href=\"mailto:pgasti@uci.edu\">pgasti@uci.edu<\/a> ),\u00a0<\/span><\/p>\n<p style=\"padding-left: 60px;\"><span style=\"font-family: Tahoma;\">Yanbin\u00a0Lu ( <a href=\"mailto:yanbin@uci.edu\">yanbin@uci.edu<\/a> ),\u00a0Jeffery\u00a0Burke ( <a href=\"mailto:jburke@remap.ucla.edu\">jburke@remap.ucla.edu<\/a> ),\u00a0<\/span><\/p>\n<p style=\"padding-left: 60px;\"><span style=\"font-family: Tahoma;\">Van\u00a0Jacobson ( <a href=\"mailto:van@parc.com\">van@parc.com<\/a> ),\u00a0Lixia\u00a0Zhang ( <a href=\"mailto:lixia@cs.ucla.edu\">lixia@cs.ucla.edu<\/a> ).<\/span><\/p>\n<p>\u9644\u4ef6\uff1a<a href=\"https:\/\/www.icnalb.cn\/wordpress\/wp-content\/uploads\/2012\/04\/A-New-Approach-to-Securing-Audio-Conference-Tools.pdf\">A New Approach to Securing Audio Conference Tools<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u6807\u9898\uff1aA\u00a0New\u00a0Approach\u00a0to\u00a0Securing\u00a0Audio\u00a0Conference\u00a0Tools (  [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[17],"tags":[],"_links":{"self":[{"href":"https:\/\/www.icnlab.cn\/index.php?rest_route=\/wp\/v2\/posts\/822"}],"collection":[{"href":"https:\/\/www.icnlab.cn\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.icnlab.cn\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.icnlab.cn\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.icnlab.cn\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=822"}],"version-history":[{"count":2,"href":"https:\/\/www.icnlab.cn\/index.php?rest_route=\/wp\/v2\/posts\/822\/revisions"}],"predecessor-version":[{"id":825,"href":"https:\/\/www.icnlab.cn\/index.php?rest_route=\/wp\/v2\/posts\/822\/revisions\/825"}],"wp:attachment":[{"href":"https:\/\/www.icnlab.cn\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=822"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.icnlab.cn\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=822"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.icnlab.cn\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=822"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}