Designing attacks on SIP call set-up
From MaRDI portal
Publication:5962408
DOI10.1504/IJACT.2010.033795zbMATH Open1195.68016MaRDI QIDQ5962408FDOQ5962408
Authors: Anders Moen Hagalisletto, Lars Strand
Publication date: 22 September 2010
Published in: International Journal of Applied Cryptography (Search for Journal in Brave)
Recommendations
- Cryptanalysis of Farash et al.'s SIP authentication protocol
- An anonymous SIP authenticated key agreement protocol based on elliptic curve cryptography
- A study on the interworking for SIP-based secure VoIP communication with security protocols in the heterogeneous network
- Robust and efficient authentication scheme for session initiation protocol
- A Robust and Efficient SIP Authentication Scheme
information securityauthenticationformal specificationsVoIPsession initiation protocolvoice over IPasterisk implementationcall hijack attackscall non-repudiationPROSASIP call set-up
Cited In (5)
- Title not available (Why is that?)
- A study on the interworking for SIP-based secure VoIP communication with security protocols in the heterogeneous network
- A framework for protecting a SIP-based infrastructure against malformed message attacks
- Security issues in VoIP based on H.323
- Cryptanalysis of Farash et al.'s SIP authentication protocol
This page was built for publication: Designing attacks on SIP call set-up
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5962408)