-
1
-
-
74249085217
-
-
ETSI Standard Telecommunications and Internet Converged Services and Protocols for Advanced Networking (TISPAN), ETSI
-
282001 ES 2008 NGN Functional Architecture. ETSI Standard Telecommunications and Internet Converged Services and Protocols for Advanced Networking (TISPAN), ETSI.
-
(2008)
NGN Functional Architecture
-
-
-
2
-
-
84898374732
-
-
Technical Specification Telecommunications and Internet Converged Services and Protocols for Advanced Networking (TISPAN), ETSI
-
187003 TS 2008 Security Architecture. Technical Specification Telecommunications and Internet Converged Services and Protocols for Advanced Networking (TISPAN), ETSI.
-
(2008)
Security Architecture
-
-
-
3
-
-
84947775612
-
-
ETSI Standard Telecommunications and Internet Converged Services and Protocols for Advanced Networking (TISPAN), ETSI
-
282004 ES 2008 Network Attachment Sub-System (NASS). ETSI Standard Telecommunications and Internet Converged Services and Protocols for Advanced Networking (TISPAN), ETSI.
-
(2008)
Network Attachment Sub-System (NASS)
-
-
-
6
-
-
77952119728
-
-
Technical Specification Group Services and System Aspects, 3rd Generation Partnership Project
-
23.060 TS 2008 General Packet Radio Service (GPRS); Service description; Stage 2. Technical Specification Group Services and System Aspects, 3rd Generation Partnership Project.
-
(2008)
General Packet Radio Service (GPRS); Service description; Stage 2
-
-
-
7
-
-
84947710278
-
-
Technical specification group core network and terminals, 3rd Generation Partnership Project
-
23.101 TS 2007 General Universal Mobile Telecommunications System (UMTS) architecture. Technical specification group core network and terminals, 3rd Generation Partnership Project.
-
(2007)
General Universal Mobile Telecommunications System (UMTS) architecture
-
-
-
8
-
-
0345883398
-
-
Technical specification group core network and terminals, 3rd Generation Partnership Project
-
23.107 TS 2007 Quality of service (QoS) concept and architecture. Technical specification group core network and terminals, 3rd Generation Partnership Project.
-
(2007)
Quality of service (QoS) concept and architecture
-
-
-
12
-
-
84947712799
-
-
Technical specification group core network and terminals, 3rd Generation Partnership Project
-
29.162 TS 2008 Interworking between the IM CN subsystem and IP networks. Technical specification group core network and terminals, 3rd Generation Partnership Project.
-
(2008)
Interworking between the IM CN subsystem and IP networks
-
-
-
15
-
-
84947721449
-
-
Technical specification group core network and terminals, 3rd Generation Partnership Project
-
29.208 TS 2007 End-to-end Quality of Service (QoS) signalling flows. Technical specification group core network and terminals, 3rd Generation Partnership Project.
-
(2007)
End-to-end Quality of Service (QoS) signalling flows
-
-
-
16
-
-
84947733752
-
-
Technical specification group core network and terminals, 3rd Generation Partnership Project
-
29.209 TS 2007 Policy control over Gq interface. Technical specification group core network and terminals, 3rd Generation Partnership Project.
-
(2007)
Policy control over Gq interface
-
-
-
20
-
-
43949088364
-
-
Technical specification group core network and terminals, 3rd Generation Partnership Project
-
31.101 TS 2007 UICC-terminal interface; Physical and logical characteristics. Technical specification group core network and terminals, 3rd Generation Partnership Project.
-
(2007)
UICC-terminal interface; Physical and logical characteristics
-
-
-
24
-
-
77950244411
-
-
Technical Specification Group Services and System Aspects, 3rd Generation Partnership Project
-
33.203 TS 2007 3G Security; Access security for IP-based services. Technical Specification Group Services and System Aspects, 3rd Generation Partnership Project.
-
(2007)
3G Security; Access security for IP-based services
-
-
-
25
-
-
84944732333
-
-
Technical Specification Group Services and System Aspects, 3rd Generation Partnership Project
-
33.210 TS 2008 3G security; Network Domain Security (NDS); IP network layer security. Technical Specification Group Services and System Aspects, 3rd Generation Partnership Project.
-
(2008)
3G security; Network Domain Security (NDS); IP network layer security
-
-
-
26
-
-
84947792131
-
-
Technical Specification Group Services and System Aspects, 3rd Generation Partnership Project
-
33.310 TS 2007 Network Domain Security (NDS); Authentication Framework (AF). Technical Specification Group Services and System Aspects, 3rd Generation Partnership Project.
-
(2007)
Network Domain Security (NDS); Authentication Framework (AF)
-
-
-
27
-
-
77955017048
-
-
Technical Specification Group Services and System Aspects, 3rd Generation Partnership Project
-
33.828 TR 2008 IMS media plane security. Technical Specification Group Services and System Aspects, 3rd Generation Partnership Project.
-
(2008)
IMS media plane security
-
-
-
28
-
-
84947779730
-
-
Technical Specification Group Services and System Aspects, 3rd Generation Partnership Project
-
33.978 TR 2007 Security aspects of early IP Multimedia Subsystem (IMS). Technical Specification Group Services and System Aspects, 3rd Generation Partnership Project.
-
(2007)
Security aspects of early IP Multimedia Subsystem (IMS)
-
-
-
30
-
-
84947783597
-
-
Technical Specification Group Services and System Aspects, 3rd Generation Partnership Project
-
35.206 TS 2007 3G Security; Specification of the MILENAGE Algorithm Set: An example algorithm set for the 3GPP authentication and key generation functions f1, f1*, f2, f3, f4, f5 and f5*; Document 2: Algorithm Specification. Technical Specification Group Services and System Aspects, 3rd Generation Partnership Project.
-
(2007)
3G Security; Specification of the MILENAGE Algorithm Set: An example algorithm set for the 3GPP authentication and key generation functions f1, f1*, f2, f3, f4, f5 and f5*; Document 2: Algorithm Specification
-
-
-
31
-
-
0346326000
-
Bankable postage for network services
-
Abadi M, Birrell AD, Burrows M, Dabek F and Wobber T 2003 Bankable postage for network services ACSC: Asian Computing Science Conference, LNCS.
-
(2003)
ACSC: Asian Computing Science Conference, LNCS
-
-
Abadi, M.1
Birrell, A.D.2
Burrows, M.3
Dabek, F.4
Wobber, T.5
-
32
-
-
55349096825
-
Abusing SIP authentication
-
IEEE Computer Society, Los Alamitos, CA
-
Abdelnur H, Avanesor T, Rusinowitch M and State R 2008 Abusing SIP authentication. International Symposium on Information Assurance and Security, pp. 237-242. IEEE Computer Society, Los Alamitos, CA.
-
(2008)
International Symposium on Information Assurance and Security
, pp. 237-242
-
-
Abdelnur, H.1
Avanesor, T.2
Rusinowitch, M.3
State, R.4
-
38
-
-
3042644992
-
-
Federal Information Processing Standards publication, NIST
-
AES 2001 FIPS 197: Advanced Encryption Standard (AES). Federal Information Processing Standards publication, NIST.
-
(2001)
FIPS 197: Advanced Encryption Standard (AES)
-
-
-
39
-
-
0036360781
-
Routing through the mist: Privacy preserving communication in ubiquitous computing environments
-
IEEE Computer Society, Washington, DCA
-
Al-Muhtadi J, Campbell R, Kapadia A, Mickunas MD and Yi S 2002 Routing through the mist: Privacy preserving communication in ubiquitous computing environments. ICDCS '02: Proceedings of the 22nd International Conference on Distributed Computing Systems (ICDCS'02), 74. IEEE Computer Society, Washington, DCA.
-
(2002)
ICDCS '02: Proceedings of the 22nd International Conference on Distributed Computing Systems (ICDCS'02)
, pp. 74
-
-
Al-Muhtadi, J.1
Campbell, R.2
Kapadia, A.3
Mickunas, M.D.4
Yi, S.5
-
40
-
-
84947708583
-
-
Andersen S, Duric A, Astrom H, Hagen R, Kleijn W and Linden J Internet Low Bit Rate Codec (iLBC) RFC 3951 (Experimental).
-
Internet Low Bit Rate Codec (iLBC) RFC 3951 (Experimental)
-
-
Andersen, S.1
Duric, A.2
Astrom, H.3
Hagen, R.4
Kleijn, W.5
Linden, J.6
-
45
-
-
0004035654
-
-
Obsoleted by RFC 3435, updated by RFC 3660
-
Arango M, Dugan A, Elliott I, Huitema C and Pickett S 1999 Media Gateway Control Protocol (MGCP) Version 1.0 RFC 2705 (Informational). Obsoleted by RFC 3435, updated by RFC 3660.
-
(1999)
Media Gateway Control Protocol (MGCP) Version 1.0 RFC 2705 (Informational)
-
-
Arango, M.1
Dugan, A.2
Elliott, I.3
Huitema, C.4
Pickett, S.5
-
55
-
-
33750230605
-
SNOOZE: toward a Stateful NetwOrk prOtocol fuzZEr
-
Springer, Samos
-
Banks G, Cova M, Felmetsger V, Almeroth K, Kemmerer R and Vigna G 2006 SNOOZE: toward a Stateful NetwOrk prOtocol fuzZEr. Proceedings of the Information Security Conference (ISC) LNCS. Springer, Samos.
-
(2006)
Proceedings of the Information Security Conference (ISC) LNCS
-
-
Banks, G.1
Cova, M.2
Felmetsger, V.3
Almeroth, K.4
Kemmerer, R.5
Vigna, G.6
-
56
-
-
0141427794
-
A signal analysis of network traffic anomalies
-
ACM Press, New York
-
Barford P, Kline J, Plonka D and Ron A 2002 A signal analysis of network traffic anomalies. IMW '02: Proceedings of the 2nd ACM SIGCOMM Workshop on Internet measurment, 71-82. ACM Press, New York.
-
(2002)
IMW '02: Proceedings of the 2nd ACM SIGCOMM Workshop on Internet measurment
, pp. 71-82
-
-
Barford, P.1
Kline, J.2
Plonka, D.3
Ron, A.4
-
61
-
-
33744529805
-
-
Technical report, University of Illinois in Chicago
-
Bernstein D, 2005 Cache-timing attacks on AES. Technical report, University of Illinois in Chicago.
-
(2005)
Cache-timing attacks on AES
-
-
Bernstein, D.1
-
64
-
-
0026397734
-
Differential cryptanalysis of DES-like cryptosystems.
-
Biham E and Shamir A 1991. Differential cryptanalysis of DES-like cryptosystems. CRYPTO'90 & Journal of Cryptology 4(1), 3-72.
-
(1991)
CRYPTO'90 & Journal of Cryptology
, vol.4
, Issue.1
, pp. 3-72
-
-
Biham, E.1
Shamir, A.2
-
68
-
-
0003872048
-
-
Updated by RFCs 3759, 4815
-
Bormann C, Burmeister C, Degermark M, Fukushima H, Hannu H, Jonsson LE, Hakenberg R, Koren T, Le K, Liu Z, Martensson A, Miyazaki A, Svanbro K, Wiebke T, Yoshimura T and Zheng H 2001 RObust Header Compression (ROHC): Framework and Four Profiles: RTP, UDP, ESP, and Uncompressed RFC 3095 (Proposed Standard). Updated by RFCs 3759, 4815.
-
(2001)
RObust Header Compression (ROHC): Framework and Four Profiles: RTP, UDP, ESP, and Uncompressed RFC 3095 (Proposed Standard)
-
-
Bormann, C.1
Burmeister, C.2
Degermark, M.3
Fukushima, H.4
Hannu, H.5
Jonsson, L.E.6
Hakenberg, R.7
Koren, T.8
Le, K.9
Liu, Z.10
Martensson, A.11
Miyazaki, A.12
Svanbro, K.13
Wiebke, T.14
Yoshimura, T.15
Zheng, H.16
-
78
-
-
31544436627
-
Denial-of-service attack-detection techniques.
-
Carl G, Kesidis G, Brooks RR and Rai S 2006. Denial-of-service attack-detection techniques. IEEE Internet Computing 10(1), 82-89.
-
(2006)
IEEE Internet Computing
, vol.10
, Issue.1
, pp. 82-89
-
-
Carl, G.1
Kesidis, G.2
Brooks, R.R.3
Rai, S.4
-
85
-
-
51049122345
-
-
Cooper D, Santesson S, Farrell S, Boeyen S, Housley R and Polk W 2008 Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile RFC 5280 (Proposed Standard).
-
(2008)
Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile RFC 5280 (Proposed Standard)
-
-
Cooper, D.1
Santesson, S.2
Farrell, S.3
Boeyen, S.4
Housley, R.5
Polk, W.6
-
87
-
-
0008723266
-
-
UCRL-ID-136939, rev. 1, Department of Energy Computer Incident Advisory Capability (CIAC), Lawrence Livermore National Laboratory
-
Criscuolo PJ 2000 Distributed Denial of Service Trin00, Tribe Flood Network, Tribe Flood Network 2000 and Stacheldraht. UCRL-ID-136939, rev. 1, Department of Energy Computer Incident Advisory Capability (CIAC), Lawrence Livermore National Laboratory.
-
(2000)
Distributed Denial of Service Trin00, Tribe Flood Network, Tribe Flood Network 2000 and Stacheldraht
-
-
Criscuolo, P.J.1
-
88
-
-
0003895757
-
-
Obsoleted by RFC 3525
-
Cuervo F, Greene N, Rayhan A, Huitema C, Rosen B and Segers J 2000 Megaco Protocol Version 1.0 RFC 3015 (Proposed Standard). Obsoleted by RFC 3525.
-
(2000)
Megaco Protocol Version 1.0 RFC 3015 (Proposed Standard)
-
-
Cuervo, F.1
Greene, N.2
Rayhan, A.3
Huitema, C.4
Rosen, B.5
Segers, J.6
-
89
-
-
3042634267
-
-
Federal Information Processing Standards publication, NIST
-
DES 1999 FIPS 46-3: Data Encryption Standard (DES). Federal Information Processing Standards publication, NIST.
-
(1999)
FIPS 46-3: Data Encryption Standard (DES)
-
-
-
97
-
-
0003828189
-
-
Updated by RFC 4361
-
Droms R, Bound J, Volz B, Lemon T, Perkins C and Carney M 2003 Dynamic Host Configuration Protocol for IPv6 (DHCPv6) RFC 3315 (Proposed Standard). Updated by RFC 4361.
-
(2003)
Dynamic Host Configuration Protocol for IPv6 (DHCPv6) RFC 3315 (Proposed Standard)
-
-
Droms, R.1
Bound, J.2
Volz, B.3
Lemon, T.4
Perkins, C.5
Carney, M.6
-
98
-
-
84947724259
-
Interview with Jonathan Christensen (skype)
-
Dryburgh LS 2008 Interview with Jonathan Christensen (skype). Ecommedia Blog.
-
(2008)
Ecommedia Blog
-
-
Dryburgh, L.S.1
-
99
-
-
4143091512
-
-
Federal Information Processing Standards publication, NIST
-
DSS 2000 FIPS 186-2: Digital Signature Standard (DSS). Federal Information Processing Standards publication, NIST.
-
(2000)
FIPS 186-2: Digital Signature Standard (DSS)
-
-
-
100
-
-
0003755277
-
-
Updated by RFC 4261
-
Durham D, Boyle J, Cohen R, Herzog S, Rajan R and Sastry A 2000 The COPS (Common Open Policy Service) Protocol RFC 2748 (Proposed Standard). Updated by RFC 4261.
-
(2000)
The COPS (Common Open Policy Service) Protocol RFC 2748 (Proposed Standard)
-
-
Durham, D.1
Boyle, J.2
Cohen, R.3
Herzog, S.4
Rajan, R.5
Sastry, A.6
-
116
-
-
0013194031
-
-
Franks J, Hallam-Baker P, Hostetler J, Lawrence S, Leach P, Luotonen A and Stewart L 1999 HTTP Authentication: Basic and Digest Access Authentication RFC 2617 (Draft Standard).
-
(1999)
HTTP Authentication: Basic and Digest Access Authentication RFC 2617 (Draft Standard)
-
-
Franks, J.1
Hallam-Baker, P.2
Hostetler, J.3
Lawrence, S.4
Leach, P.5
Luotonen, A.6
Stewart, L.7
-
120
-
-
85093847546
-
Peer-to-peer botnets: overview and case study
-
USENIX Association, Berkeley, CA
-
Grizzard JB, Sharma V, Nunnery C, Kang BB and Dagon D 2007 Peer-to-peer botnets: overview and case study. HotBots'07: Proceedings of the First Workshop on Hot Topics in Understanding Botnets, 1. USENIX Association, Berkeley, CA.
-
(2007)
HotBots'07: Proceedings of the First Workshop on Hot Topics in Understanding Botnets
, pp. 1
-
-
Grizzard, J.B.1
Sharma, V.2
Nunnery, C.3
Kang, B.B.4
Dagon, D.5
-
125
-
-
0003559321
-
-
Obsoleted by RFCs 3261, 3262, 3263, 3264, 3265
-
Handley M, Schulzrinne H, Schooler E and Rosenberg J 1999 SIP: Session Initiation Protocol RFC 2543 (Proposed Standard). Obsoleted by RFCs 3261, 3262, 3263, 3264, 3265.
-
(1999)
SIP: Session Initiation Protocol RFC 2543 (Proposed Standard)
-
-
Handley, M.1
Schulzrinne, H.2
Schooler, E.3
Rosenberg, J.4
-
128
-
-
84947754332
-
-
Work in progress
-
Hasebe M, Koshiko J, Suzuki Y, Yoshikawa T and Kyzivat P 2008 Example calls flows of race conditions in the Session Initiation Protocol (SIP). Internet Draft draft-ietf-sipping-race-examples-06, Internet Engineering Task Force. Work in progress.
-
(2008)
Example calls flows of race conditions in the Session Initiation Protocol (SIP). Internet Draft draft-ietf-sipping-race-examples-06, Internet Engineering Task Force
-
-
Hasebe, M.1
Koshiko, J.2
Suzuki, Y.3
Yoshikawa, T.4
Kyzivat, P.5
-
132
-
-
32044445766
-
Effective EU and US approached to spam? Moves towards a co-ordinated technical and legal response-part I
-
Hladjk J 2005a Effective EU and US approached to spam? Moves towards a co-ordinated technical and legal response-part I. Communications Law 10(3), 71-83.
-
(2005)
Communications Law
, vol.10
, Issue.3
, pp. 71-83
-
-
Hladjk, J.1
-
133
-
-
33745464037
-
Effective EU and US approached to spam? Moves towards a co-ordinated technical and legal response-part II
-
Hladjk J 2005b Effective EU and US approached to spam? Moves towards a co-ordinated technical and legal response-part II. Communications Law 10(4), 111-120.
-
(2005)
Communications Law
, vol.10
, Issue.4
, pp. 111-120
-
-
Hladjk, J.1
-
148
-
-
34848911641
-
Social phishing.
-
Jagatic TN, Johnson NA, Jakobsson M and Menczer F 2007. Social phishing. Commun. ACM 50(10), 94-100.
-
(2007)
Commun. ACM
, vol.50
, Issue.10
, pp. 94-100
-
-
Jagatic, T.N.1
Johnson, N.A.2
Jakobsson, M.3
Menczer, F.4
-
156
-
-
84947704275
-
Spam: A terminal threat to ISPS? the legal position of ISPS concerning their anti-spam policies in the EU after the Privacy & Telecom Directive
-
Kabel J 2003 Spam: A terminal threat to ISPS? the legal position of ISPS concerning their anti-spam policies in the EU after the Privacy & Telecom Directive. Computer Law Review International.
-
(2003)
Computer Law Review International
-
-
Kabel, J.1
-
157
-
-
84947715869
-
Black OPS of TCP/IP 2005.5
-
Washington, DC
-
Kaminsky D 2006 Black OPS of TCP/IP 2005.5 ShmooCon, Washington, DC.
-
(2006)
ShmooCon
-
-
Kaminsky, D.1
-
158
-
-
70350360139
-
It's the end of the cache as we know it. Or: 64k should be good enough for anyone
-
USA
-
Kaminsky D 2008 It's the end of the cache as we know it. Or: 64k should be good enough for anyone. Blackhats, USA.
-
(2008)
Blackhats
-
-
Kaminsky, D.1
-
167
-
-
34548114558
-
Tunnels in hash functions: Md5 collisions within a minute
-
Klima V 2006 Tunnels in hash functions: Md5 collisions within a minute. IACR Eprint Server.
-
(2006)
IACR Eprint Server
-
-
Klima, V.1
-
168
-
-
30344488542
-
-
Koren T, Casner S, Geevarghese J, Thompson B and Ruddy P 2003 Enhanced Compressed RTP (CRTP) for Links with High Delay, Packet Loss and Reordering RFC 3545 (Proposed Standard).
-
(2003)
Enhanced Compressed RTP (CRTP) for Links with High Delay, Packet Loss and Reordering RFC 3545 (Proposed Standard)
-
-
Koren, T.1
Casner, S.2
Geevarghese, J.3
Thompson, B.4
Ruddy, P.5
-
169
-
-
33746191665
-
Identifying almost identical files using context triggered piecewise hashing
-
Kornblum JD 2006 Identifying almost identical files using context triggered piecewise hashing. Digital Investigation 3(Supplement 1), 91-97.
-
(2006)
Digital Investigation
, vol.3
, pp. 91-97
-
-
Kornblum, J.D.1
-
175
-
-
0346296533
-
-
O'Reilly & Associates, Sebastopol, CA
-
Lerdorf RJ, Tatroe K, Kaehms B and McGredy R 2002 Programming PHP. O'Reilly & Associates, Sebastopol, CA.
-
(2002)
Programming PHP
-
-
Lerdorf, R.J.1
Tatroe, K.2
Kaehms, B.3
McGredy, R.4
-
176
-
-
0036312325
-
Hordes: A Multicast Based Protocol for Anonymity.
-
Levine BN and Shields C 2002. Hordes: A Multicast Based Protocol for Anonymity. Journal of Computer Security 10(3), 213-240.
-
(2002)
Journal of Computer Security
, vol.10
, Issue.3
, pp. 213-240
-
-
Levine, B.N.1
Shields, C.2
-
179
-
-
33749056600
-
Tabu marking scheme to speedup IP traceback.
-
Ma M 2006. Tabu marking scheme to speedup IP traceback. Computer Networks 50(18), 3536-3549.
-
(2006)
Computer Networks
, vol.50
, Issue.18
, pp. 3536-3549
-
-
Ma, M.1
-
180
-
-
4544272175
-
Controlling high bandwidth aggregates in the network.
-
Mahajan R, Bellovin SM, Floyd S, Ioannidis J, Paxson V and Shenker S 2002. Controlling high bandwidth aggregates in the network. SIGCOMM Computer Communication Review 32(3), 62-73.
-
(2002)
SIGCOMM Computer Communication Review
, vol.32
, Issue.3
, pp. 62-73
-
-
Mahajan, R.1
Bellovin, S.M.2
Floyd, S.3
Ioannidis, J.4
Paxson, V.5
Shenker, S.6
-
197
-
-
0025557712
-
An empirical study of the reliability of unix utilities.
-
Miller BP, Fredriksen L and So B 1990. An empirical study of the reliability of unix utilities. Communications of the ACM 33(12), 32-44.
-
(1990)
Communications of the ACM
, vol.33
, Issue.12
, pp. 32-44
-
-
Miller, B.P.1
Fredriksen, L.2
So, B.3
-
199
-
-
84947785882
-
-
minisip n.d., Technical report
-
minisip n.d. http://www.minisip.org. Technical report.
-
-
-
-
201
-
-
0003757661
-
-
Updated by RFCs 1101, 1183, 1348, 1876, 1982, 1995, 1996, 2065, 2136, 2181, 2137, 2308, 2535, 2845, 3425, 3658, 4033, 4034, 4035, 4343
-
Mockapetris P 1987 Domain Names-Implementation and Specification RFC 1035 (Standard). Updated by RFCs 1101, 1183, 1348, 1876, 1982, 1995, 1996, 2065, 2136, 2181, 2137, 2308, 2535, 2845, 3425, 3658, 4033, 4034, 4035, 4343.
-
(1987)
Domain Names-Implementation and Specification RFC 1035 (Standard)
-
-
Mockapetris, P.1
-
203
-
-
85084161486
-
Inferring internet denial-of-service activity
-
USENIX Association, Berkeley, CA
-
Moore D, Voelker GM and Savage S 2001 Inferring internet denial-of-service activity. SSYM'01:Proceedings of the 10th Conference on USENIX Security Symposium, 2. USENIX Association, Berkeley, CA.
-
(2001)
SSYM'01:Proceedings of the 10th Conference on USENIX Security Symposium
, pp. 2
-
-
Moore, D.1
Voelker, G.M.2
Savage, S.3
-
206
-
-
0003629990
-
-
National Institute of Standards and Technology, Washington, DC. Federal Information Processing Standard 180-2
-
NIST 2002 Secure Hash Standard. National Institute of Standards and Technology, Washington, DC. Federal Information Processing Standard 180-2.
-
(2002)
Secure Hash Standard
-
-
-
209
-
-
11144314906
-
Simulation study of SIP signaling in an overload condition
-
ed. Hamza MH, IASTED/ACTA Press
-
Ohta M 2004 Simulation study of SIP signaling in an overload condition. In Communications, Internet, and Information Technology (ed. Hamza MH), 321-326. IASTED/ACTA Press.
-
(2004)
Communications, Internet, and Information Technology
, pp. 321-326
-
-
Ohta, M.1
-
211
-
-
84947808886
-
-
Ong L, Rytina I, Garcia M, Schwarzbauer H, Coene L, Lin H, Juhasz I, Holdrege M and Sharp C 1999 Framework Architecture for Signaling Transport RFC 2719 (Informational).
-
(1999)
Framework Architecture for Signaling Transport RFC 2719 (Informational)
-
-
Ong, L.1
Rytina, I.2
Garcia, M.3
Schwarzbauer, H.4
Coene, L.5
Lin, H.6
Juhasz, I.7
Holdrege, M.8
Sharp, C.9
-
215
-
-
0003549357
-
-
Perkins C, Kouvelas I, Hodson O, Hardman V, Handley M, Bolot J, Vega-Garcia A and Fosse-Parisis S 1997 RTP Payload for Redundant Audio Data RFC 2198 (Proposed Standard).
-
(1997)
RTP Payload for Redundant Audio Data RFC 2198 (Proposed Standard)
-
-
Perkins, C.1
Kouvelas, I.2
Hodson, O.3
Hardman, V.4
Handley, M.5
Bolot, J.6
Vega-Garcia, A.7
Fosse-Parisis, S.8
-
224
-
-
34547990629
-
-
Updated by RFC 4896
-
Price R, Bormann C, Christoffersson J, Hannu H, Liu Z and Rosenberg J 2003 Signaling Compression (SigComp) RFC 3320 (Proposed Standard). Updated by RFC 4896.
-
(2003)
Signaling Compression (SigComp) RFC 3320 (Proposed Standard)
-
-
Price, R.1
Bormann, C.2
Christoffersson, J.3
Hannu, H.4
Liu, Z.5
Rosenberg, J.6
-
225
-
-
33749660755
-
-
Expired
-
Puthenkulam J, Lortz V, Palekar A and Simon D 2003 The Compound Authentication Binding Problem. Internet draft, draft-puthenkulam-eap-binding-04, IETF. Expired.
-
(2003)
The Compound Authentication Binding Problem. Internet draft, draft-puthenkulam-eap-binding-04, IETF
-
-
Puthenkulam, J.1
Lortz, V.2
Palekar, A.3
Simon, D.4
-
226
-
-
85000701895
-
My botnet is bigger than yours (maybe, better than yours): why size estimates remain challenging
-
USENIX Association, Berkeley, CA
-
Rajab MA, Zarfoss J, Monrose F and Terzis A 2007 My botnet is bigger than yours (maybe, better than yours): why size estimates remain challenging. HotBots'07: Proceedings of the First Workshop on Hot Topics in Understanding Botnets, 5. USENIX Association, Berkeley, CA.
-
(2007)
HotBots'07: Proceedings of the First Workshop on Hot Topics in Understanding Botnets
, pp. 5
-
-
Rajab, M.A.1
Zarfoss, J.2
Monrose, F.3
Terzis, A.4
-
233
-
-
0002101577
-
Reputation systems.
-
Resnick P, Kuwabara K, Zeckhauser R and Friedman E 2000. Reputation systems. Communications of the ACM 43(12), 45-48.
-
(2000)
Communications of the ACM
, vol.43
, Issue.12
, pp. 45-48
-
-
Resnick, P.1
Kuwabara, K.2
Zeckhauser, R.3
Friedman, E.4
-
238
-
-
0005744334
-
Conference report-first advanced encryption standard (AES) candidate conference, Ventura, CA, August 20-22, 1998.
-
Roback E and Dworkin M 1999. Conference report-first advanced encryption standard (AES) candidate conference, Ventura, CA, August 20-22, 1998. Journal of Research of the National Institute of Standards and Technology 104(1), 97-105.
-
(1999)
Journal of Research of the National Institute of Standards and Technology
, vol.104
, Issue.1
, pp. 97-105
-
-
Roback, E.1
Dworkin, M.2
-
251
-
-
0037984544
-
-
Updated by RFCs 3265, 3853, 4320, 4916
-
Rosenberg J, Schulzrinne H, Camarillo G, Johnston A, Peterson J, Sparks R, Handley M and Schooler E 2002b SIP: Session Initiation Protocol RFC 3261 (Proposed Standard). Updated by RFCs 3265, 3853, 4320, 4916.
-
(2002)
SIP: Session Initiation Protocol RFC 3261 (Proposed Standard)
-
-
Rosenberg, J.1
Schulzrinne, H.2
Camarillo, G.3
Johnston, A.4
Peterson, J.5
Sparks, R.6
Handley, M.7
Schooler, E.8
-
261
-
-
0035361712
-
Network support for IP traceback.
-
Savage S, Wetherall D, Karlin A and Anderson T 2001. Network support for IP traceback. IEEE/ACM Transactions Networks 9(3), 226-237.
-
(2001)
IEEE/ACM Transactions Networks
, vol.9
, Issue.3
, pp. 226-237
-
-
Savage, S.1
Wetherall, D.2
Karlin, A.3
Anderson, T.4
-
271
-
-
33845562254
-
Voip intrusion detection through interacting protocol state machines
-
IEEE Computer Society, Washington, DC
-
Sengar H, Wijesekera D, Wang H and Jajodia S 2006 Voip intrusion detection through interacting protocol state machines. DSN '06: Proceedings of the International Conference on Dependable Systems and Networks (DSN'06), 393-402. IEEE Computer Society, Washington, DC.
-
(2006)
DSN '06: Proceedings of the International Conference on Dependable Systems and Networks (DSN'06)
, pp. 393-402
-
-
Sengar, H.1
Wijesekera, D.2
Wang, H.3
Jajodia, S.4
-
275
-
-
84947717123
-
-
Federal Information Processing Standards publication, NIST
-
SHS 2007 FIPS 180-3: Secure Hash Standard (SHS). Federal Information Processing Standards publication, NIST.
-
(2007)
FIPS 180-3: Secure Hash Standard (SHS)
-
-
-
276
-
-
84947733806
-
-
SIPit n.d., Technical report
-
SIPit n.d. http://bugs.sipit.net/. Technical report.
-
-
-
-
277
-
-
84947713336
-
Protecting VoIP services against DoS using overload control
-
Technical University of Denmark, Coperhagen
-
Sisalem D and Floroiu J 2009 Protecting VoIP services against DoS using overload control. NorSec 2008. Technical University of Denmark, Coperhagen.
-
(2009)
NorSec 2008
-
-
Sisalem, D.1
Floroiu, J.2
-
278
-
-
84947771784
-
Inter-domain authentication and authorization mechanisms for roaming sip users
-
ed. Mahmoud QH and Weghorn H, INSTICC Press
-
Sisalem D and Kuthan J 2004 Inter-domain authentication and authorization mechanisms for roaming sip users. In Wireless Information Systems (ed. Mahmoud QH and Weghorn H), 89-99. INSTICC Press.
-
(2004)
Wireless Information Systems
, pp. 89-99
-
-
Sisalem, D.1
Kuthan, J.2
-
280
-
-
0034997397
-
Advanced and authenticated marking schemes for IP traceback
-
Song DX and Perrig A 2001 Advanced and authenticated marking schemes for IP traceback. INFOCOM, 878-886.
-
(2001)
INFOCOM
, pp. 878-886
-
-
Song, D.X.1
Perrig, A.2
-
284
-
-
84870669203
-
-
Technical Report UCB/CSD-84-182, EECS Department, University of California, Berkeley
-
Terry DB, Painter M, Riggle DW and Zhou S 1984 The Berkeley Internet Name Domain Server. Technical Report UCB/CSD-84-182, EECS Department, University of California, Berkeley.
-
(1984)
The Berkeley Internet Name Domain Server
-
-
Terry, D.B.1
Painter, M.2
Riggle, D.W.3
Zhou, S.4
-
285
-
-
77954024333
-
-
Work in progress
-
Tschofenig H, Hodges J, Peterson J, Polk J and Sicker D 2008 SIP SAML Profile and Binding. Internet Draft draft-ietf-sip-saml-04, Internet Engineering Task Force. Work in progress.
-
(2008)
SIP SAML Profile and Binding. Internet Draft draft-ietf-sip-saml-04, Internet Engineering Task Force
-
-
Tschofenig, H.1
Hodges, J.2
Peterson, J.3
Polk, J.4
Sicker, D.5
-
289
-
-
2942728016
-
VoIP security and privacy threat taxonomy. Report 1.0. von Ahn L, Blum M and Langford J 2004 Telling humans and computers apart automatically.
-
VoIPSA 2005. VoIP security and privacy threat taxonomy. Report 1.0. von Ahn L, Blum M and Langford J 2004 Telling humans and computers apart automatically. Communications of the ACM 47(2), 56-60.
-
(2005)
Communications of the ACM
, vol.47
, Issue.2
, pp. 56-60
-
-
-
291
-
-
0036343692
-
Detecting syn flooding attacks
-
Wang H, Zhang D and Shin KG 2002 Detecting syn flooding attacks INFOCOM, 3, 1530-1539.
-
(2002)
INFOCOM
, vol.3
, pp. 1530-1539
-
-
Wang, H.1
Zhang, D.2
Shin, K.G.3
-
292
-
-
24944591357
-
How to break md5 and other hash functions
-
ed. Cramer R, of Lecture Notes in Computer Science, Springer, London
-
Wang X and Yu H 2005a How to break md5 and other hash functions In EUROCRYPT (ed. Cramer R), vol. 3494 of Lecture Notes in Computer Science, 19-35. Springer, London.
-
(2005)
EUROCRYPT
, vol.3494
, pp. 19-35
-
-
Wang, X.1
Yu, H.2
-
293
-
-
24944591357
-
How to break MD5 and other hash functions
-
Lecture Notes in Computer Science, Springer, London
-
Wang X and Yu H 2005b How to break MD5 and other hash functions. Advances in Cryptology-EUROCRYPT 2005, 19-35. Lecture Notes in Computer Science, Vol. 3494. Springer, London.
-
(2005)
Advances in Cryptology-EUROCRYPT 2005
, vol.3494
, pp. 19-35
-
-
Wang, X.1
Yu, H.2
-
301
-
-
84947764614
-
Yahoo on trail of site hackers
-
February
-
Wired 2000 Yahoo on trail of site hackers. Wired.com February.
-
(2000)
Wired.com
-
-
-
306
-
-
84947794345
-
-
Zfone n.d., Technical report
-
Zfone n.d. http://www.zfoneproject.com. Technical report.
-
-
-
-
307
-
-
44549085455
-
Denial of service attack and prevention on SIP VoIP infrastructures using DNS flooding
-
ACM, New York
-
Zhang G, Ehlert S, Magedanz T and Sisalem D 2007 Denial of service attack and prevention on SIP VoIP infrastructures using DNS flooding. IPTComm '07: Proceedings of the 1st International Conference on Principles, Systems and Applications of IP Telecommunications, 57-66. ACM, New York.
-
(2007)
IPTComm '07: Proceedings of the 1st International Conference on Principles, Systems and Applications of IP Telecommunications
, pp. 57-66
-
-
Zhang, G.1
Ehlert, S.2
Magedanz, T.3
Sisalem, D.4
-
308
-
-
0344857334
-
-
Updated by RFC 3459
-
Zimmerer E, Peterson J, Vemuri A, Ong L, Audet F, Watson M and Zonoun M 2001 MIME media types for ISUP and QSIG Objects RFC 3204 (Proposed Standard). Updated by RFC 3459.
-
(2001)
MIME media types for ISUP and QSIG Objects RFC 3204 (Proposed Standard)
-
-
Zimmerer, E.1
Peterson, J.2
Vemuri, A.3
Ong, L.4
Audet, F.5
Watson, M.6
Zonoun, M.7
|