-
2
-
-
0346437728
-
Voice Over IP
-
U. Varshney et al., "Voice Over IP," Commun. ACM, vol. 45, no. 1, 2002
-
(2002)
Commun. ACM
, vol.45
, Issue.1
-
-
Varshney, U.1
-
11
-
-
84892578907
-
-
Minisip, http://www.minisip.org/index.html
-
-
-
-
18
-
-
67650650173
-
-
RFC 3702, Feb.
-
J. Loughney and G. Camarillo, "Authentication, Authorization, and Accounting Requirements for the Session Initiation Protocol (SIP)," RFC 3702, Feb. 2004.
-
(2004)
Authentication, Authorization, and Accounting Requirements for the Session Initiation Protocol (SIP)
-
-
Loughney, J.1
Camarillo, G.2
-
20
-
-
24144441221
-
Design and Implementation of SIP Security
-
Information Networking Convergence in Broadband and Mobile Networking-International Conf., ICOIN 2005
-
C.-C. Chang et al., "Design and Implementation of SIP Security," Lecture Notes in Computer Science, v 3391, Information Networking Convergence in Broadband and Mobile Networking-International Conf., ICOIN 2005, 2005, pp. 669-78.
-
(2005)
Lecture Notes in Computer Science
, vol.3391
, pp. 669-678
-
-
Chang, C.-C.1
-
21
-
-
24344457092
-
Secure Authentication Scheme for Session Initiation Protocol
-
C.-C. Yanga, R.-C. Wangb, and W.-T. Liuc, "Secure Authentication Scheme for Session Initiation Protocol," Computers & Security (2005), vol. 24, pp. 381-86.
-
(2005)
Computers & Security
, vol.24
, pp. 381-386
-
-
Yanga, C.-C.1
Wangb, R.-C.2
Liuc, W.-T.3
-
23
-
-
0036870280
-
SIP Security Issues: The SIP Authentication Procedure and Its Processing Load
-
Nov.
-
S. Salsano, L. Veltri, and D. Papalilo, "SIP Security Issues: The SIP Authentication Procedure and Its Processing Load," IEEE Network, vol. 16, Nov. 2002.
-
(2002)
IEEE Network
, vol.16
-
-
Salsano, S.1
Veltri, L.2
Papalilo, D.3
-
29
-
-
84892585695
-
Secure VoIP: Call Establishment and Media Protection
-
J. Bilien, E. Eliasson, and J.-O. Vatn, "Secure VoIP: Call Establishment and Media Protection," 2nd Wksp. Securing Voice over IP, Washington DC, June 2005.
-
2nd Wksp. Securing Voice over IP, Washington DC, June 2005
-
-
Bilien, J.1
Eliasson, E.2
Vatn, J.-O.3
-
31
-
-
0003976889
-
Trends in Denial of Service Attack Technology
-
Oct.
-
Houle, Waver: "Trends in Denial of Service Attack Technology," CERT report, Oct. 2001, http://www.cert.org/archive/pdf/DoS-trends.pdf
-
(2001)
CERT Report
-
-
Houle, W.1
-
43
-
-
84889855627
-
-
K. Spett, "Blind SQL Injection," 2003, http://www.spidynamics. com/whitepapers/Blind-SQLInjection.pd
-
(2003)
Blind SQL Injection
-
-
Spett, K.1
-
45
-
-
84892560115
-
DoS Attacks on SIP Infrastructures
-
D. Sisalem, J. Kuthan, and G. Schäfer, "DoS Attacks on SIP Infrastructures," Voice over IP: Challenges and Solutions, GlobeCom 2004, Dallas, TX, Dec. 2004.
-
Voice over IP: Challenges and Solutions, GlobeCom 2004, Dallas, TX, Dec. 2004
-
-
Sisalem, D.1
Kuthan, J.2
Schäfer, G.3
-
47
-
-
84892599042
-
SCIDIVE: A Stateful and Cross Protocol Intrusion Detection Architecture for Voice-over-IP Environments
-
Y.-S. Wu et al., "SCIDIVE: A Stateful and Cross Protocol Intrusion Detection Architecture for Voice-over-IP Environments," Proc. 2004 Int'l. Conf. Dependable Systems and Networks (DSN'04).
-
Proc. 2004 Int'l. Conf. Dependable Systems and Networks (DSN'04)
-
-
Wu, Y.-S.1
-
48
-
-
78651531872
-
SIP Message Tampering: THE SQL Code INJECTION Attack
-
D. Geneiatakis et al., "SIP Message Tampering: THE SQL Code INJECTION Attack," Proc. 13th Int'l. Conf. Software, Telecomm. and Computer Networks (SoftCOM 2005) IEEE, Split, Croatia, Sept. 2005.
-
Proc. 13th Int'l. Conf. Software, Telecomm. and Computer Networks (SoftCOM 2005) IEEE, Split, Croatia, Sept. 2005
-
-
Geneiatakis, D.1
|