We present a survey of authentication and key agreement schemes that are proposed for the SIP protocol. SIP has become the center piece for most VoIP architectures. Performance and …
K Gai, M Qiu - IEEE Transactions on Industrial Informatics, 2017 - ieeexplore.ieee.org
Recent booming growth of networking-based solutions have brought numerous challenges to security and privacy from both perspectives of insider and outsider threats. The encrypted …
Application layer Denial-of-Service (DoS) attacks are generated by exploiting vulnerabilities of the protocol implementation or its design. Unlike volumetric DoS attacks, these are …
We present a comprehensive survey of Voice over IP security academic research, using a set of 245 publications forming a closed cross-citation set. We classify these papers …
BCM Cappers, JJ Van Wijk - IEEE transactions on visualization …, 2017 - ieeexplore.ieee.org
Multivariate event sequences are ubiquitous: travel history, telecommunication conversations, and server logs are some examples. Besides standard properties such as …
The session initiation protocol (SIP) is a powerful and superior signaling protocol for the voice over internet protocol (VoIP). Authentication is an important security requirement for …
Session Initiation Protocol is a core protocol for coming real time communication networks, including VoIP, IMS and IPTV networks. Based on the open IP stack, it is similarly …
Q Xie - International Journal of Communication Systems, 2012 - Wiley Online Library
The session initiation protocol (SIP) is an authentication protocol used in 3G mobile networks. In 2009, Tsai proposed an authenticated key agreement scheme as an …
Virtual private network (VPN) is the traditional approach for an end-to-end secure connection between two endpoints. Most existing VPN solutions are intended for wired …