Sciweavers

23 search results - page 3 / 5
» Abusing SIP Authentication
Sort
View
COMCOM
2010
92views more  COMCOM 2010»
13 years 3 months ago
A secure and efficient SIP authentication scheme for converged VoIP networks
Eun-Jun Yoon, Kee-Young Yoo, Cheonshik Kim, YouSik...
PERCOM
2005
ACM
14 years 4 months ago
Unleashing the Power of Wearable Devices in a SIP Infrastructure
The Session Initiation Protocol (SIP) has been widely adopted for Instant Messaging (IM) and VoIP telephony both by the enterprise and in service provider systems. Till now, SIP f...
Arup Acharya, Stefan Berger, Chandrasekhar Narayan...
AAAIDEA
2005
IEEE
13 years 10 months ago
SOSIMPLE: A Serverless, Standards-based, P2P SIP Communication System
Voice over IP (VoIP) and Instant Messaging (IM) systems to date have either followed a client-server model or have required the use of clients that do not follow any VoIP or IM st...
David A. Bryan, Bruce Lowekamp, Cullen Jennings
CISC
2007
Springer
98views Cryptology» more  CISC 2007»
13 years 11 months ago
Enhanced Security by OS-Oriented Encapsulation in TPM-Enabled DRM
Abstract. The Trusted Computing Group (TCG) defines the specifications for the Trusted Platform Module (TPM) and corresponding trust mechanisms that allow a TPM-enabled platform ...
Yongdong Wu, Feng Bao, Robert H. Deng, Marc Mouffr...
TWC
2008
154views more  TWC 2008»
13 years 4 months ago
TUA: A Novel Compromise-Resilient Authentication Architecture for Wireless Mesh Networks
User authentication is essential in service-oriented communication networks to identify and reject any unauthorized network access. The state-of-the-art practice in securing wirele...
Xiaodong Lin, Rongxing Lu, Pin-Han Ho, Xuemin Shen...