Results 171 to 180 of about 53,786 (213)
Some of the next articles are maybe not open access.
Network Security, 2016
There is no such thing as static security - all security products become vulnerable over time as the threat landscape evolves. Any 'deploy once, update infrequently or never' security solution is inherently flawed. Which is why every switched-on organisation routinely updates its anti-virus and anti-malware solutions, hardens its infrastructure and ...
openaire +1 more source
There is no such thing as static security - all security products become vulnerable over time as the threat landscape evolves. Any 'deploy once, update infrequently or never' security solution is inherently flawed. Which is why every switched-on organisation routinely updates its anti-virus and anti-malware solutions, hardens its infrastructure and ...
openaire +1 more source
Improvement of a SIP Security Mechanism
Applied Mechanics and Materials, 2012SIP is one of the mainstream protocols in the VoIP. A majority of SIP’s security mechanism only provides a single direction authentication from server to client such as HTTP digest authentication. To improve the present situation, a new security mechanism of SIP based on the improved HTTP digest authentication is put forward in this study.
Long Tao Liu, Wen Tang
openaire +1 more source
Security framework for designing SIP scanner
2013 21st Iranian Conference on Electrical Engineering (ICEE), 2013The purpose of this paper is to provide a framework for detecting vulnerabilities in SIP (Session Initiation Protocol) networks. In other words, we try to find weaknesses in SIP enabled entities that an attacker by exploiting them is able to attack the system and affect it.
Mitra Alidoosti +2 more
openaire +1 more source
SIP security problems in NGM Services
The 2007 International Conference on Next Generation Mobile Applications, Services and Technologies (NGMAST 2007), 2007A variety of wireless interfaces are available to access Internet content in a heterogeneous network composed by technologies with limited QoS abilities. Performance increasing solutions become economic in specific parts of the network architecture, as the network sizes and the clients' numbers increase.
Ferenc Leitold +2 more
openaire +1 more source
Towards Secure Mobile Payment Based on SIP
15th Annual IEEE International Conference and Workshop on the Engineering of Computer Based Systems (ecbs 2008), 2008Mobile payment has some unique advantages over more traditional payment methods in, for example, TV shopping and mobile multimedia services. Unfortunately, most existing mobile payment solutions rely heavily on underlying communication infrastructures, which are platform-dependent and have no unified implementation criteria. This limitation is reducing,
Ge Zhang, Feng Cheng, Christoph Meinel
openaire +1 more source
Secure SIP signalling service in IMS network
2014 9th International Conference on Intelligent Systems: Theories and Applications (SITA-14), 2014Securing service and signalization is an important aspect in the IMS network (IP Multimedia Subsystem). The signaling is based mainly on SIP protocol (Session Initialization Protocol). This protocol presents several challenges in terms of security which induce security problems in IMS network.
Elmostafa Belmekki +3 more
openaire +1 more source
On applying SIP security to networked appliances
Proceedings 2002 IEEE 4th International Workshop on Networked Appliances (Cat. No.02EX525), 2002The importance of security to Networked Applicances is unarguable. In one of the worst possible scenarios, a successful attacker may gain control of the networked devices in a victim?s home. Disastrous consequnces are not difficult to imagine. In this work, we provide a general security threats analysis for Networked Appliances and discuss the ...
null Tat Chan, null Senthil Sengodan
openaire +1 more source
An ontology description for SIP security flaws
Computer Communications, 2007Voice over IP (VoIP) services based on the Session Initiation Protocol (SIP) gain ground as compared to other protocols like MGCP or H.323. However, the open SIP architecture constitutes the provided services vulnerable to various attacks, similar to those currently existing in Internet. The lack of a formal way to describe VoIP vulnerabilities hinders
Dimitris Geneiatakis +1 more
openaire +1 more source
Security and Test Environment for SIP
2007One of the most important parts in next generation VoIP is security management. When a designer develops a protocol stack based on SIP(Session Initiation Protocol), it is necessary to develop test scenario, test environment and adaptation test technology for security test of the system.
Geuk Lee +6 more
openaire +1 more source
Design and Implementation of SIP Security
2005Session Initiation Protocol (SIP) is the Internet Engineering Task Force (IETF) standard for IP telephony. It is the most promising candidate as a signaling protocol for the future IP telephony services. Comparing with the reliability provided by the traditional telephone systems, there is an obvious need to provide a certain level of quality and ...
Chia-Chen Chang +3 more
openaire +1 more source

