Sciweavers

Share
50 search results - page 1 / 10
» sips 2008
Sort
View
SEC
2008
8 years 3 months ago
Detecting More SIP Attacks on VoIP Services by Combining Rule Matching and State Transition Models
The Session Initiation Protocol (SIP) has been used widely for Voice over IP (VoIP) service because of its potential advantages, economical efficiency and call setup simplicity. Ho...
Dongwon Seo, Heejo Lee, Ejovi Nuwere
ISM
2008
IEEE
98views Multimedia» more  ISM 2008»
8 years 8 months ago
Protecting SIP Proxy Servers from Ringing-Based Denial-of-Service Attacks
As Internet telephony systems continue to replace existing Public Switched Telephone Network systems, proxy servers running the Session Initiation Protocol (SIP) will continue to ...
William Conner, Klara Nahrstedt
AICCSA
2008
IEEE
283views Hardware» more  AICCSA 2008»
8 years 8 months ago
Performance analysis of identity management in the Session Initiation Protocol (SIP)
The Session Initiation Protocol (SIP) is a standard for managing IP multimedia sessions in the Internet. Identity management in SIP is a crucial security field that deals with id...
Yacine Rebahi, Jordi Jaen Pallares, Tuan Minh Nguy...
GLOBECOM
2008
IEEE
8 years 8 months ago
A Theoretical Model of the Effects of Losses and Delays on the Performance of SIP
—The Session Initiation Protocol (SIP) is widely used for VoIP communication. Losses caused by network or server overload would cause retransmissions and delays in the session es...
Dorgham Sisalem, Mikkel Liisberg, Yacine Rebahi
SECURWARE
2008
IEEE
8 years 8 months ago
Formal Modeling of Authentication in SIP Registration
The Session Initiation Protocol (SIP) is increasingly used as a signaling protocol for administrating Voice over IP (VoIP) phone calls. SIP can be configured in several ways so t...
Anders Moen Hagalisletto, Lars Strand
books