Results 41 to 50 of about 197,970 (370)

A lightweight privacy preserving authenticated key agreement protocol for SIP-based VoIP [PDF]

open access: yes, 2016
Session Initiation Protocol (SIP) is an essential part of most Voice over Internet Protocol (VoIP) architecture. Although SIP provides attractive features, it is exposed to various security threats, and so an efficient and secure authentication scheme is
Tang, Shanyu   +2 more
core   +1 more source

The Virtual Device: Expanding Wireless Communication Services Through Service Discovery and Session Mobility [PDF]

open access: yes, 2005
We present a location-based, ubiquitous service architecture, based on the Session Initiation Protocol (SIP) and a service discovery protocol that enables users to enhance the multimedia communications services available on their mobile devices by ...
Kellerer, Wolfgang   +3 more
core   +2 more sources

Analisis Quality of Services Jaringan VoIP pada VPN menggunakan InterAsteriks Exchange dan Session Initiation Protocol

open access: yesTechno.Com, 2020
Di dalam komunikasi Voice over Internet Protocol (VoIP) mengenal beberapa macam protocol tambahan selain protocol standar internet Transfer Control Protocol/Internet Protocol (TCP/IP), beberapa diantaranya adalah protocol Session Initation Protocol (SIP),
Agus Heriyanto   +2 more
doaj   +1 more source

Covert Channels in SIP for VoIP signalling

open access: yes, 2008
In this paper, we evaluate available steganographic techniques for SIP (Session Initiation Protocol) that can be used for creating covert channels during signaling phase of VoIP (Voice over IP) call.
B. Lampson   +3 more
core   +1 more source

Performance simulation and analysis of SIP-based call setup over AODV-routed MANET

open access: yesTongxin xuebao, 2006
In order to use SIP in MANET,a new SIP call setup mechanism was proposed which could finish the route discovery and SIP call setup simultaneously through extending the AODV routing protocol.Simulation results and per-formance analysis show that the new ...
ZHANG Xiao-yan1   +2 more
doaj   +2 more sources

Rqa based approach to detect and prevent ddos attacks in voip networks

open access: yesCybernetics and Information Technologies, 2014
Voice over Internet Protocol (VoIP) is a family of technologies for the transmission of voice over Internet. Voice is converted into digital signals and transmitted as data packets.
Jeyanthi N.   +2 more
doaj   +1 more source

Opus and Session Initiation Protocol Security in Voice over IP (VOIP )

open access: yesEuropean Journal of Engineering Research and Science, 2019
The purpose of the paper is to clearly elaborate how Opus Codec can be used as Voice over IP or Unified Communication as known Opus is an Audio Codec which is royalty free and most versatile format of Audio Codec the Opus codec is used for Interactive ...
Siddarth Kaul, Anuj K. Jain
semanticscholar   +1 more source

Generic Models for Mobility Management in Next Generation Networks [PDF]

open access: yes, 2005
In the network community different mobility management techniques have been proposed over the years. However, many of these techniques share a surprisingly high number of similarities.
Cristofano, Maria Luisa   +2 more
core   +2 more sources

I-TNT: PHONE NUMBER EXPANSION AND TRANSLATION SYSTEM FOR MANAGING INTERCONNECTIVITY ADDRESSING IN SIP PEERING [PDF]

open access: yesJournal of Engineering Science and Technology, 2015
Voice over IP (VoIP) subscribers is growing vastly in the recent years due to the ever increase in smartphones, 3G, WiFi, etc. This growth leads the VoIP service providers to peer with each other through Session Initiation Protocol (SIP) peering for low ...
A. A. KHUDHER, S. RAMADASS
doaj  

Session Initiation Protocol Security: A Brief Review [PDF]

open access: yesJournal of Computer Science, 2012
Problem statement: This study aims to discuss several issues on session initiation protocol security and threats. An in-depth investigation related to SIP with the intention to categorize the wide variety of SIP security issues. Approach: Related papers to the infrastructure of SIP security were analyzed.
Chen-Wei Tan   +3 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy