Sciweavers

42 search results - page 4 / 9
» SIP Security
Sort
View
IEEEIAS
2008
IEEE
14 years 4 months ago
Abusing SIP Authentication
The recent and massive deployment of Voice over IP infrastructures had raised the importance of the VoIP security and more precisely of the underlying signalisation protocol SIP. ...
Humberto J. Abdelnur, Tigran Avanesov, Michaë...
ECBS
2008
IEEE
113views Hardware» more  ECBS 2008»
13 years 10 months ago
Towards Secure Mobile Payment Based on SIP
Mobile payment has some unique advantages over more traditional payment methods in, for example, TV shopping and mobile multimedia services. Unfortunately, most existing mobile pa...
Ge Zhang, Feng Cheng 0002, Christoph Meinel
COMCOM
2010
92views more  COMCOM 2010»
13 years 8 months ago
A secure and efficient SIP authentication scheme for converged VoIP networks
Eun-Jun Yoon, Kee-Young Yoo, Cheonshik Kim, YouSik...
TELSYS
2010
154views more  TELSYS 2010»
13 years 4 months ago
Blocking attacks on SIP VoIP proxies caused by external processing
As Voice over IP (VoIP) applications become increasingly popular, they are more and more facing security challenges that have not been present in the traditional Public Switched Te...
Ge Zhang, Simone Fischer-Hübner, Sven Ehlert