메뉴 건너뛰기




Volumn 8, Issue 3, 2006, Pages 68-81

Survey of security vulnerabilities in session initiation protocol

Author keywords

[No Author keywords available]

Indexed keywords

INSTANT MESSAGING; OPEN ARCHITECTURE; QUALITATIVE ANALYSIS; SECURITY MECHANISM; SECURITY PROBLEMS; SECURITY VULNERABILITIES; SESSION INITIATION PROTOCOL; SESSION INITIATION PROTOCOLS;

EID: 84881472647     PISSN: None     EISSN: 1553877X     Source Type: Journal    
DOI: 10.1109/COMST.2006.253270     Document Type: Review
Times cited : (172)

References (49)
  • 2
    • 0346437728 scopus 로고    scopus 로고
    • Voice Over IP
    • U. Varshney et al., "Voice Over IP," Commun. ACM, vol. 45, no. 1, 2002
    • (2002) Commun. ACM , vol.45 , Issue.1
    • Varshney, U.1
  • 11
    • 84892578907 scopus 로고    scopus 로고
    • Minisip, http://www.minisip.org/index.html
  • 20
    • 24144441221 scopus 로고    scopus 로고
    • Design and Implementation of SIP Security
    • Information Networking Convergence in Broadband and Mobile Networking-International Conf., ICOIN 2005
    • C.-C. Chang et al., "Design and Implementation of SIP Security," Lecture Notes in Computer Science, v 3391, Information Networking Convergence in Broadband and Mobile Networking-International Conf., ICOIN 2005, 2005, pp. 669-78.
    • (2005) Lecture Notes in Computer Science , vol.3391 , pp. 669-678
    • Chang, C.-C.1
  • 21
    • 24344457092 scopus 로고    scopus 로고
    • Secure Authentication Scheme for Session Initiation Protocol
    • C.-C. Yanga, R.-C. Wangb, and W.-T. Liuc, "Secure Authentication Scheme for Session Initiation Protocol," Computers & Security (2005), vol. 24, pp. 381-86.
    • (2005) Computers & Security , vol.24 , pp. 381-386
    • Yanga, C.-C.1    Wangb, R.-C.2    Liuc, W.-T.3
  • 23
    • 0036870280 scopus 로고    scopus 로고
    • SIP Security Issues: The SIP Authentication Procedure and Its Processing Load
    • Nov.
    • S. Salsano, L. Veltri, and D. Papalilo, "SIP Security Issues: The SIP Authentication Procedure and Its Processing Load," IEEE Network, vol. 16, Nov. 2002.
    • (2002) IEEE Network , vol.16
    • Salsano, S.1    Veltri, L.2    Papalilo, D.3
  • 31
    • 0003976889 scopus 로고    scopus 로고
    • Trends in Denial of Service Attack Technology
    • Oct.
    • Houle, Waver: "Trends in Denial of Service Attack Technology," CERT report, Oct. 2001, http://www.cert.org/archive/pdf/DoS-trends.pdf
    • (2001) CERT Report
    • Houle, W.1
  • 43
    • 84889855627 scopus 로고    scopus 로고
    • K. Spett, "Blind SQL Injection," 2003, http://www.spidynamics. com/whitepapers/Blind-SQLInjection.pd
    • (2003) Blind SQL Injection
    • Spett, K.1
  • 47
    • 84892599042 scopus 로고    scopus 로고
    • SCIDIVE: A Stateful and Cross Protocol Intrusion Detection Architecture for Voice-over-IP Environments
    • Y.-S. Wu et al., "SCIDIVE: A Stateful and Cross Protocol Intrusion Detection Architecture for Voice-over-IP Environments," Proc. 2004 Int'l. Conf. Dependable Systems and Networks (DSN'04).
    • Proc. 2004 Int'l. Conf. Dependable Systems and Networks (DSN'04)
    • Wu, Y.-S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.