메뉴 건너뛰기




Volumn , Issue , 2009, Pages 1-336

SIP Security

Author keywords

[No Author keywords available]

Indexed keywords

HUMAN RESOURCE MANAGEMENT; INTERNET PROTOCOLS; INTERNET TELEPHONY; NETWORK SECURITY; STUDENTS; VOICE/DATA COMMUNICATION SYSTEMS;

EID: 84947768665     PISSN: None     EISSN: None     Source Type: Book    
DOI: 10.1002/9780470516997     Document Type: Book
Times cited : (55)

References (309)
  • 1
    • 74249085217 scopus 로고    scopus 로고
    • ETSI Standard Telecommunications and Internet Converged Services and Protocols for Advanced Networking (TISPAN), ETSI
    • 282001 ES 2008 NGN Functional Architecture. ETSI Standard Telecommunications and Internet Converged Services and Protocols for Advanced Networking (TISPAN), ETSI.
    • (2008) NGN Functional Architecture
  • 2
    • 84898374732 scopus 로고    scopus 로고
    • Technical Specification Telecommunications and Internet Converged Services and Protocols for Advanced Networking (TISPAN), ETSI
    • 187003 TS 2008 Security Architecture. Technical Specification Telecommunications and Internet Converged Services and Protocols for Advanced Networking (TISPAN), ETSI.
    • (2008) Security Architecture
  • 3
    • 84947775612 scopus 로고    scopus 로고
    • ETSI Standard Telecommunications and Internet Converged Services and Protocols for Advanced Networking (TISPAN), ETSI
    • 282004 ES 2008 Network Attachment Sub-System (NASS). ETSI Standard Telecommunications and Internet Converged Services and Protocols for Advanced Networking (TISPAN), ETSI.
    • (2008) Network Attachment Sub-System (NASS)
  • 6
    • 77952119728 scopus 로고    scopus 로고
    • Technical Specification Group Services and System Aspects, 3rd Generation Partnership Project
    • 23.060 TS 2008 General Packet Radio Service (GPRS); Service description; Stage 2. Technical Specification Group Services and System Aspects, 3rd Generation Partnership Project.
    • (2008) General Packet Radio Service (GPRS); Service description; Stage 2
  • 7
    • 84947710278 scopus 로고    scopus 로고
    • Technical specification group core network and terminals, 3rd Generation Partnership Project
    • 23.101 TS 2007 General Universal Mobile Telecommunications System (UMTS) architecture. Technical specification group core network and terminals, 3rd Generation Partnership Project.
    • (2007) General Universal Mobile Telecommunications System (UMTS) architecture
  • 8
    • 0345883398 scopus 로고    scopus 로고
    • Technical specification group core network and terminals, 3rd Generation Partnership Project
    • 23.107 TS 2007 Quality of service (QoS) concept and architecture. Technical specification group core network and terminals, 3rd Generation Partnership Project.
    • (2007) Quality of service (QoS) concept and architecture
  • 12
    • 84947712799 scopus 로고    scopus 로고
    • Technical specification group core network and terminals, 3rd Generation Partnership Project
    • 29.162 TS 2008 Interworking between the IM CN subsystem and IP networks. Technical specification group core network and terminals, 3rd Generation Partnership Project.
    • (2008) Interworking between the IM CN subsystem and IP networks
  • 15
    • 84947721449 scopus 로고    scopus 로고
    • Technical specification group core network and terminals, 3rd Generation Partnership Project
    • 29.208 TS 2007 End-to-end Quality of Service (QoS) signalling flows. Technical specification group core network and terminals, 3rd Generation Partnership Project.
    • (2007) End-to-end Quality of Service (QoS) signalling flows
  • 16
    • 84947733752 scopus 로고    scopus 로고
    • Technical specification group core network and terminals, 3rd Generation Partnership Project
    • 29.209 TS 2007 Policy control over Gq interface. Technical specification group core network and terminals, 3rd Generation Partnership Project.
    • (2007) Policy control over Gq interface
  • 20
    • 43949088364 scopus 로고    scopus 로고
    • Technical specification group core network and terminals, 3rd Generation Partnership Project
    • 31.101 TS 2007 UICC-terminal interface; Physical and logical characteristics. Technical specification group core network and terminals, 3rd Generation Partnership Project.
    • (2007) UICC-terminal interface; Physical and logical characteristics
  • 24
    • 77950244411 scopus 로고    scopus 로고
    • Technical Specification Group Services and System Aspects, 3rd Generation Partnership Project
    • 33.203 TS 2007 3G Security; Access security for IP-based services. Technical Specification Group Services and System Aspects, 3rd Generation Partnership Project.
    • (2007) 3G Security; Access security for IP-based services
  • 25
    • 84944732333 scopus 로고    scopus 로고
    • Technical Specification Group Services and System Aspects, 3rd Generation Partnership Project
    • 33.210 TS 2008 3G security; Network Domain Security (NDS); IP network layer security. Technical Specification Group Services and System Aspects, 3rd Generation Partnership Project.
    • (2008) 3G security; Network Domain Security (NDS); IP network layer security
  • 26
    • 84947792131 scopus 로고    scopus 로고
    • Technical Specification Group Services and System Aspects, 3rd Generation Partnership Project
    • 33.310 TS 2007 Network Domain Security (NDS); Authentication Framework (AF). Technical Specification Group Services and System Aspects, 3rd Generation Partnership Project.
    • (2007) Network Domain Security (NDS); Authentication Framework (AF)
  • 27
    • 77955017048 scopus 로고    scopus 로고
    • Technical Specification Group Services and System Aspects, 3rd Generation Partnership Project
    • 33.828 TR 2008 IMS media plane security. Technical Specification Group Services and System Aspects, 3rd Generation Partnership Project.
    • (2008) IMS media plane security
  • 28
    • 84947779730 scopus 로고    scopus 로고
    • Technical Specification Group Services and System Aspects, 3rd Generation Partnership Project
    • 33.978 TR 2007 Security aspects of early IP Multimedia Subsystem (IMS). Technical Specification Group Services and System Aspects, 3rd Generation Partnership Project.
    • (2007) Security aspects of early IP Multimedia Subsystem (IMS)
  • 38
    • 3042644992 scopus 로고    scopus 로고
    • Federal Information Processing Standards publication, NIST
    • AES 2001 FIPS 197: Advanced Encryption Standard (AES). Federal Information Processing Standards publication, NIST.
    • (2001) FIPS 197: Advanced Encryption Standard (AES)
  • 61
    • 33744529805 scopus 로고    scopus 로고
    • Technical report, University of Illinois in Chicago
    • Bernstein D, 2005 Cache-timing attacks on AES. Technical report, University of Illinois in Chicago.
    • (2005) Cache-timing attacks on AES
    • Bernstein, D.1
  • 64
    • 0026397734 scopus 로고
    • Differential cryptanalysis of DES-like cryptosystems.
    • Biham E and Shamir A 1991. Differential cryptanalysis of DES-like cryptosystems. CRYPTO'90 & Journal of Cryptology 4(1), 3-72.
    • (1991) CRYPTO'90 & Journal of Cryptology , vol.4 , Issue.1 , pp. 3-72
    • Biham, E.1    Shamir, A.2
  • 89
    • 3042634267 scopus 로고    scopus 로고
    • Federal Information Processing Standards publication, NIST
    • DES 1999 FIPS 46-3: Data Encryption Standard (DES). Federal Information Processing Standards publication, NIST.
    • (1999) FIPS 46-3: Data Encryption Standard (DES)
  • 98
    • 84947724259 scopus 로고    scopus 로고
    • Interview with Jonathan Christensen (skype)
    • Dryburgh LS 2008 Interview with Jonathan Christensen (skype). Ecommedia Blog.
    • (2008) Ecommedia Blog
    • Dryburgh, L.S.1
  • 99
    • 4143091512 scopus 로고    scopus 로고
    • Federal Information Processing Standards publication, NIST
    • DSS 2000 FIPS 186-2: Digital Signature Standard (DSS). Federal Information Processing Standards publication, NIST.
    • (2000) FIPS 186-2: Digital Signature Standard (DSS)
  • 132
    • 32044445766 scopus 로고    scopus 로고
    • Effective EU and US approached to spam? Moves towards a co-ordinated technical and legal response-part I
    • Hladjk J 2005a Effective EU and US approached to spam? Moves towards a co-ordinated technical and legal response-part I. Communications Law 10(3), 71-83.
    • (2005) Communications Law , vol.10 , Issue.3 , pp. 71-83
    • Hladjk, J.1
  • 133
    • 33745464037 scopus 로고    scopus 로고
    • Effective EU and US approached to spam? Moves towards a co-ordinated technical and legal response-part II
    • Hladjk J 2005b Effective EU and US approached to spam? Moves towards a co-ordinated technical and legal response-part II. Communications Law 10(4), 111-120.
    • (2005) Communications Law , vol.10 , Issue.4 , pp. 111-120
    • Hladjk, J.1
  • 156
    • 84947704275 scopus 로고    scopus 로고
    • Spam: A terminal threat to ISPS? the legal position of ISPS concerning their anti-spam policies in the EU after the Privacy & Telecom Directive
    • Kabel J 2003 Spam: A terminal threat to ISPS? the legal position of ISPS concerning their anti-spam policies in the EU after the Privacy & Telecom Directive. Computer Law Review International.
    • (2003) Computer Law Review International
    • Kabel, J.1
  • 157
    • 84947715869 scopus 로고    scopus 로고
    • Black OPS of TCP/IP 2005.5
    • Washington, DC
    • Kaminsky D 2006 Black OPS of TCP/IP 2005.5 ShmooCon, Washington, DC.
    • (2006) ShmooCon
    • Kaminsky, D.1
  • 158
    • 70350360139 scopus 로고    scopus 로고
    • It's the end of the cache as we know it. Or: 64k should be good enough for anyone
    • USA
    • Kaminsky D 2008 It's the end of the cache as we know it. Or: 64k should be good enough for anyone. Blackhats, USA.
    • (2008) Blackhats
    • Kaminsky, D.1
  • 167
    • 34548114558 scopus 로고    scopus 로고
    • Tunnels in hash functions: Md5 collisions within a minute
    • Klima V 2006 Tunnels in hash functions: Md5 collisions within a minute. IACR Eprint Server.
    • (2006) IACR Eprint Server
    • Klima, V.1
  • 169
    • 33746191665 scopus 로고    scopus 로고
    • Identifying almost identical files using context triggered piecewise hashing
    • Kornblum JD 2006 Identifying almost identical files using context triggered piecewise hashing. Digital Investigation 3(Supplement 1), 91-97.
    • (2006) Digital Investigation , vol.3 , pp. 91-97
    • Kornblum, J.D.1
  • 176
    • 0036312325 scopus 로고    scopus 로고
    • Hordes: A Multicast Based Protocol for Anonymity.
    • Levine BN and Shields C 2002. Hordes: A Multicast Based Protocol for Anonymity. Journal of Computer Security 10(3), 213-240.
    • (2002) Journal of Computer Security , vol.10 , Issue.3 , pp. 213-240
    • Levine, B.N.1    Shields, C.2
  • 179
    • 33749056600 scopus 로고    scopus 로고
    • Tabu marking scheme to speedup IP traceback.
    • Ma M 2006. Tabu marking scheme to speedup IP traceback. Computer Networks 50(18), 3536-3549.
    • (2006) Computer Networks , vol.50 , Issue.18 , pp. 3536-3549
    • Ma, M.1
  • 197
    • 0025557712 scopus 로고
    • An empirical study of the reliability of unix utilities.
    • Miller BP, Fredriksen L and So B 1990. An empirical study of the reliability of unix utilities. Communications of the ACM 33(12), 32-44.
    • (1990) Communications of the ACM , vol.33 , Issue.12 , pp. 32-44
    • Miller, B.P.1    Fredriksen, L.2    So, B.3
  • 199
    • 84947785882 scopus 로고    scopus 로고
    • minisip n.d., Technical report
    • minisip n.d. http://www.minisip.org. Technical report.
  • 201
    • 0003757661 scopus 로고
    • Updated by RFCs 1101, 1183, 1348, 1876, 1982, 1995, 1996, 2065, 2136, 2181, 2137, 2308, 2535, 2845, 3425, 3658, 4033, 4034, 4035, 4343
    • Mockapetris P 1987 Domain Names-Implementation and Specification RFC 1035 (Standard). Updated by RFCs 1101, 1183, 1348, 1876, 1982, 1995, 1996, 2065, 2136, 2181, 2137, 2308, 2535, 2845, 3425, 3658, 4033, 4034, 4035, 4343.
    • (1987) Domain Names-Implementation and Specification RFC 1035 (Standard)
    • Mockapetris, P.1
  • 206
    • 0003629990 scopus 로고    scopus 로고
    • National Institute of Standards and Technology, Washington, DC. Federal Information Processing Standard 180-2
    • NIST 2002 Secure Hash Standard. National Institute of Standards and Technology, Washington, DC. Federal Information Processing Standard 180-2.
    • (2002) Secure Hash Standard
  • 209
    • 11144314906 scopus 로고    scopus 로고
    • Simulation study of SIP signaling in an overload condition
    • ed. Hamza MH, IASTED/ACTA Press
    • Ohta M 2004 Simulation study of SIP signaling in an overload condition. In Communications, Internet, and Information Technology (ed. Hamza MH), 321-326. IASTED/ACTA Press.
    • (2004) Communications, Internet, and Information Technology , pp. 321-326
    • Ohta, M.1
  • 238
    • 0005744334 scopus 로고    scopus 로고
    • Conference report-first advanced encryption standard (AES) candidate conference, Ventura, CA, August 20-22, 1998.
    • Roback E and Dworkin M 1999. Conference report-first advanced encryption standard (AES) candidate conference, Ventura, CA, August 20-22, 1998. Journal of Research of the National Institute of Standards and Technology 104(1), 97-105.
    • (1999) Journal of Research of the National Institute of Standards and Technology , vol.104 , Issue.1 , pp. 97-105
    • Roback, E.1    Dworkin, M.2
  • 275
    • 84947717123 scopus 로고    scopus 로고
    • Federal Information Processing Standards publication, NIST
    • SHS 2007 FIPS 180-3: Secure Hash Standard (SHS). Federal Information Processing Standards publication, NIST.
    • (2007) FIPS 180-3: Secure Hash Standard (SHS)
  • 276
    • 84947733806 scopus 로고    scopus 로고
    • SIPit n.d., Technical report
    • SIPit n.d. http://bugs.sipit.net/. Technical report.
  • 277
    • 84947713336 scopus 로고    scopus 로고
    • Protecting VoIP services against DoS using overload control
    • Technical University of Denmark, Coperhagen
    • Sisalem D and Floroiu J 2009 Protecting VoIP services against DoS using overload control. NorSec 2008. Technical University of Denmark, Coperhagen.
    • (2009) NorSec 2008
    • Sisalem, D.1    Floroiu, J.2
  • 278
    • 84947771784 scopus 로고    scopus 로고
    • Inter-domain authentication and authorization mechanisms for roaming sip users
    • ed. Mahmoud QH and Weghorn H, INSTICC Press
    • Sisalem D and Kuthan J 2004 Inter-domain authentication and authorization mechanisms for roaming sip users. In Wireless Information Systems (ed. Mahmoud QH and Weghorn H), 89-99. INSTICC Press.
    • (2004) Wireless Information Systems , pp. 89-99
    • Sisalem, D.1    Kuthan, J.2
  • 280
    • 0034997397 scopus 로고    scopus 로고
    • Advanced and authenticated marking schemes for IP traceback
    • Song DX and Perrig A 2001 Advanced and authenticated marking schemes for IP traceback. INFOCOM, 878-886.
    • (2001) INFOCOM , pp. 878-886
    • Song, D.X.1    Perrig, A.2
  • 289
    • 2942728016 scopus 로고    scopus 로고
    • VoIP security and privacy threat taxonomy. Report 1.0. von Ahn L, Blum M and Langford J 2004 Telling humans and computers apart automatically.
    • VoIPSA 2005. VoIP security and privacy threat taxonomy. Report 1.0. von Ahn L, Blum M and Langford J 2004 Telling humans and computers apart automatically. Communications of the ACM 47(2), 56-60.
    • (2005) Communications of the ACM , vol.47 , Issue.2 , pp. 56-60
  • 291
    • 0036343692 scopus 로고    scopus 로고
    • Detecting syn flooding attacks
    • Wang H, Zhang D and Shin KG 2002 Detecting syn flooding attacks INFOCOM, 3, 1530-1539.
    • (2002) INFOCOM , vol.3 , pp. 1530-1539
    • Wang, H.1    Zhang, D.2    Shin, K.G.3
  • 292
    • 24944591357 scopus 로고    scopus 로고
    • How to break md5 and other hash functions
    • ed. Cramer R, of Lecture Notes in Computer Science, Springer, London
    • Wang X and Yu H 2005a How to break md5 and other hash functions In EUROCRYPT (ed. Cramer R), vol. 3494 of Lecture Notes in Computer Science, 19-35. Springer, London.
    • (2005) EUROCRYPT , vol.3494 , pp. 19-35
    • Wang, X.1    Yu, H.2
  • 293
    • 24944591357 scopus 로고    scopus 로고
    • How to break MD5 and other hash functions
    • Lecture Notes in Computer Science, Springer, London
    • Wang X and Yu H 2005b How to break MD5 and other hash functions. Advances in Cryptology-EUROCRYPT 2005, 19-35. Lecture Notes in Computer Science, Vol. 3494. Springer, London.
    • (2005) Advances in Cryptology-EUROCRYPT 2005 , vol.3494 , pp. 19-35
    • Wang, X.1    Yu, H.2
  • 301
    • 84947764614 scopus 로고    scopus 로고
    • Yahoo on trail of site hackers
    • February
    • Wired 2000 Yahoo on trail of site hackers. Wired.com February.
    • (2000) Wired.com
  • 306
    • 84947794345 scopus 로고    scopus 로고
    • Zfone n.d., Technical report
    • Zfone n.d. http://www.zfoneproject.com. Technical report.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.