A survey of SIP authentication and key agreement schemes
We present a survey of authentication and key agreement schemes that are proposed for the
SIP protocol. SIP has become the center piece for most VoIP architectures. Performance and …
SIP protocol. SIP has become the center piece for most VoIP architectures. Performance and …
A comprehensive survey of voice over IP security research
AD Keromytis - IEEE Communications Surveys & Tutorials, 2011 - ieeexplore.ieee.org
We present a comprehensive survey of Voice over IP security academic research, using a
set of 245 publications forming a closed cross-citation set. We classify these papers …
set of 245 publications forming a closed cross-citation set. We classify these papers …
Real-time human pose recognition in parts from single depth images
We propose a new method to quickly and accurately predict 3D positions of body joints from
a single depth image, using no temporal information. We take an object recognition …
a single depth image, using no temporal information. We take an object recognition …
Method and system for third party client authentication
GK Sharma, LK Hon, JD Burjoski… - US Patent …, 2014 - Google Patents
Methods and systems for third party client authentication of a client. A method includes
displaying a user interface on a display of the client, the user interface including an option to …
displaying a user interface on a display of the client, the user interface including an option to …
[PDF][PDF] Survey of security vulnerabilities in session initiation protocol
The open architecture of the Internet and the use of open standards like Session Initiation
Protocol (SIP) constitute the provisioning of services (eg, Internet telephony, instant …
Protocol (SIP) constitute the provisioning of services (eg, Internet telephony, instant …
Secure authentication scheme for session initiation protocol
CC Yang, RC Wang, WT Liu - Computers & Security, 2005 - Elsevier
The Session Initiation Protocol provides an expandable and easy solution to the IP-based
telephony environment. When users ask to use an SIP service, they need to be …
telephony environment. When users ask to use an SIP service, they need to be …
An efficient and secure authentication and key agreement scheme for session initiation protocol using ECC
The session initiation protocol (SIP) is a powerful and superior signaling protocol for the
voice over internet protocol (VoIP). Authentication is an important security requirement for …
voice over internet protocol (VoIP). Authentication is an important security requirement for …
Cloud identity management security issues & solutions: a taxonomy
Purpose Cloud computing systems represent one of the most complex computing systems
currently in existence. Current applications of Cloud involve extensive use of distributed …
currently in existence. Current applications of Cloud involve extensive use of distributed …
[PDF][PDF] Efficient Nonce-based Authentication Scheme for Session Initiation Protocol.
JL Tsai - Int. J. Netw. Secur., 2009 - ms11.voip.edu.tw
Abstract In recent years, Session Initiation Protocol (SIP) is more and more popular.
However, there are many security problems in the Session Initiation Protocol. In 2005, Yang …
However, there are many security problems in the Session Initiation Protocol. In 2005, Yang …
A new provably secure authentication and key agreement protocol for SIP using ECC
L Wu, Y Zhang, F Wang - Computer Standards & Interfaces, 2009 - Elsevier
SIP has been chosen as the protocol for multimedia application in 3G mobile networks. The
authentication mechanism proposed in SIP specification is HTTP digest based …
authentication mechanism proposed in SIP specification is HTTP digest based …