共 14 条
[1]
Attila W., Torsten B., Thomas S., Linux implementation and evaluation of a cooperation mechanism for hybrid wireless networks, Local Computer Networks, Proceedings 2006 31st IEEE Conference on, pp. 939-946, (2006)
[2]
Elwell J., Connected Identity in the Session Initiation Protocol (SIP), (2007)
[3]
Franks J., Hallam-Baker P., Hostetler J., Lawrence S., Leach P., Luotonen A., Stewart L., HTTP Authentication: Basic and Digest Access Authentication, (1999)
[4]
Geneiatakis D., Dagiuklas T., Kambourakis G., Lambrinoudakis C., Gritzalis S., Ehlert K.S., Sisalem D., Survey of security vulnerabilities in session initiation protocol, communications surveys and tutorials, IEEE, 8, 3, pp. 68-81, (2006)
[5]
Geneiatakis D., Kambourakis G., Dagiuklas T., Lambrinoudakis C., Gritzalis S., SIP security mechanisms: A state-of-the-art review, Proc. 5th International Network Conference (INC), pp. 147-155, (2005)
[6]
Jackson W., NIST Prepares to Hash out New Standard, (2007)
[7]
Kuhn D.R., Walsh T., Fries S., Security Considerations for Voice Over IP systems, NIST SP, pp. 800-858, (2005)
[8]
McGann S., Sicker D.C., An analysis of security threats and tools in SIP-based VoIP systems, 2nd Workshop on Securing Voice over IP, (2005)
[9]
(2008)
[10]
Rescorla E., SSL and TLS - Designing and Building Secure Systems, pp. 32-36, (2000)