Designing attacks on SIP call set-up
From MaRDI portal
Publication:5962408
Recommendations
- Cryptanalysis of Farash et al.'s SIP authentication protocol
- An anonymous SIP authenticated key agreement protocol based on elliptic curve cryptography
- A study on the interworking for SIP-based secure VoIP communication with security protocols in the heterogeneous network
- Robust and efficient authentication scheme for session initiation protocol
- A Robust and Efficient SIP Authentication Scheme
Cited in
(5)- A framework for protecting a SIP-based infrastructure against malformed message attacks
- scientific article; zbMATH DE number 2013774 (Why is no real title available?)
- A study on the interworking for SIP-based secure VoIP communication with security protocols in the heterogeneous network
- Cryptanalysis of Farash et al.'s SIP authentication protocol
- Security issues in VoIP based on H.323
This page was built for publication: Designing attacks on SIP call set-up
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5962408)