A survey of SIP authentication and key agreement schemes

HH Kilinc, T Yanik - IEEE communications surveys & tutorials, 2013 - ieeexplore.ieee.org
We present a survey of authentication and key agreement schemes that are proposed for the
SIP protocol. SIP has become the center piece for most VoIP architectures. Performance and …

A comprehensive survey of voice over IP security research

AD Keromytis - IEEE Communications Surveys & Tutorials, 2011 - ieeexplore.ieee.org
We present a comprehensive survey of Voice over IP security academic research, using a
set of 245 publications forming a closed cross-citation set. We classify these papers …

Real-time human pose recognition in parts from single depth images

J Shotton, A Fitzgibbon, M Cook, T Sharp… - CVPR …, 2011 - ieeexplore.ieee.org
We propose a new method to quickly and accurately predict 3D positions of body joints from
a single depth image, using no temporal information. We take an object recognition …

Method and system for third party client authentication

GK Sharma, LK Hon, JD Burjoski… - US Patent …, 2014 - Google Patents
Methods and systems for third party client authentication of a client. A method includes
displaying a user interface on a display of the client, the user interface including an option to …

[PDF][PDF] Survey of security vulnerabilities in session initiation protocol

D Geneiatakis, T Dagiuklas… - … Surveys & Tutorials, 2006 - researchgate.net
The open architecture of the Internet and the use of open standards like Session Initiation
Protocol (SIP) constitute the provisioning of services (eg, Internet telephony, instant …

Secure authentication scheme for session initiation protocol

CC Yang, RC Wang, WT Liu - Computers & Security, 2005 - Elsevier
The Session Initiation Protocol provides an expandable and easy solution to the IP-based
telephony environment. When users ask to use an SIP service, they need to be …

An efficient and secure authentication and key agreement scheme for session initiation protocol using ECC

H Arshad, M Nikooghadam - Multimedia Tools and Applications, 2016 - Springer
The session initiation protocol (SIP) is a powerful and superior signaling protocol for the
voice over internet protocol (VoIP). Authentication is an important security requirement for …

Cloud identity management security issues & solutions: a taxonomy

U Habiba, R Masood, MA Shibli, MA Niazi - Complex Adaptive Systems …, 2014 - Springer
Purpose Cloud computing systems represent one of the most complex computing systems
currently in existence. Current applications of Cloud involve extensive use of distributed …

[PDF][PDF] Efficient Nonce-based Authentication Scheme for Session Initiation Protocol.

JL Tsai - Int. J. Netw. Secur., 2009 - ms11.voip.edu.tw
Abstract In recent years, Session Initiation Protocol (SIP) is more and more popular.
However, there are many security problems in the Session Initiation Protocol. In 2005, Yang …

A new provably secure authentication and key agreement protocol for SIP using ECC

L Wu, Y Zhang, F Wang - Computer Standards & Interfaces, 2009 - Elsevier
SIP has been chosen as the protocol for multimedia application in 3G mobile networks. The
authentication mechanism proposed in SIP specification is HTTP digest based …