Results 171 to 180 of about 53,786 (213)
Some of the next articles are maybe not open access.

The SIP security fallacy

Network Security, 2016
There is no such thing as static security - all security products become vulnerable over time as the threat landscape evolves. Any 'deploy once, update infrequently or never' security solution is inherently flawed. Which is why every switched-on organisation routinely updates its anti-virus and anti-malware solutions, hardens its infrastructure and ...
openaire   +1 more source

Improvement of a SIP Security Mechanism

Applied Mechanics and Materials, 2012
SIP is one of the mainstream protocols in the VoIP. A majority of SIP’s security mechanism only provides a single direction authentication from server to client such as HTTP digest authentication. To improve the present situation, a new security mechanism of SIP based on the improved HTTP digest authentication is put forward in this study.
Long Tao Liu, Wen Tang
openaire   +1 more source

Security framework for designing SIP scanner

2013 21st Iranian Conference on Electrical Engineering (ICEE), 2013
The purpose of this paper is to provide a framework for detecting vulnerabilities in SIP (Session Initiation Protocol) networks. In other words, we try to find weaknesses in SIP enabled entities that an attacker by exploiting them is able to attack the system and affect it.
Mitra Alidoosti   +2 more
openaire   +1 more source

SIP security problems in NGM Services

The 2007 International Conference on Next Generation Mobile Applications, Services and Technologies (NGMAST 2007), 2007
A variety of wireless interfaces are available to access Internet content in a heterogeneous network composed by technologies with limited QoS abilities. Performance increasing solutions become economic in specific parts of the network architecture, as the network sizes and the clients' numbers increase.
Ferenc Leitold   +2 more
openaire   +1 more source

Towards Secure Mobile Payment Based on SIP

15th Annual IEEE International Conference and Workshop on the Engineering of Computer Based Systems (ecbs 2008), 2008
Mobile payment has some unique advantages over more traditional payment methods in, for example, TV shopping and mobile multimedia services. Unfortunately, most existing mobile payment solutions rely heavily on underlying communication infrastructures, which are platform-dependent and have no unified implementation criteria. This limitation is reducing,
Ge Zhang, Feng Cheng, Christoph Meinel
openaire   +1 more source

Secure SIP signalling service in IMS network

2014 9th International Conference on Intelligent Systems: Theories and Applications (SITA-14), 2014
Securing service and signalization is an important aspect in the IMS network (IP Multimedia Subsystem). The signaling is based mainly on SIP protocol (Session Initialization Protocol). This protocol presents several challenges in terms of security which induce security problems in IMS network.
Elmostafa Belmekki   +3 more
openaire   +1 more source

On applying SIP security to networked appliances

Proceedings 2002 IEEE 4th International Workshop on Networked Appliances (Cat. No.02EX525), 2002
The importance of security to Networked Applicances is unarguable. In one of the worst possible scenarios, a successful attacker may gain control of the networked devices in a victim?s home. Disastrous consequnces are not difficult to imagine. In this work, we provide a general security threats analysis for Networked Appliances and discuss the ...
null Tat Chan, null Senthil Sengodan
openaire   +1 more source

An ontology description for SIP security flaws

Computer Communications, 2007
Voice over IP (VoIP) services based on the Session Initiation Protocol (SIP) gain ground as compared to other protocols like MGCP or H.323. However, the open SIP architecture constitutes the provided services vulnerable to various attacks, similar to those currently existing in Internet. The lack of a formal way to describe VoIP vulnerabilities hinders
Dimitris Geneiatakis   +1 more
openaire   +1 more source

Security and Test Environment for SIP

2007
One of the most important parts in next generation VoIP is security management. When a designer develops a protocol stack based on SIP(Session Initiation Protocol), it is necessary to develop test scenario, test environment and adaptation test technology for security test of the system.
Geuk Lee   +6 more
openaire   +1 more source

Design and Implementation of SIP Security

2005
Session Initiation Protocol (SIP) is the Internet Engineering Task Force (IETF) standard for IP telephony. It is the most promising candidate as a signaling protocol for the future IP telephony services. Comparing with the reliability provided by the traditional telephone systems, there is an obvious need to provide a certain level of quality and ...
Chia-Chen Chang   +3 more
openaire   +1 more source

Home - About - Disclaimer - Privacy