نتایج جستجو برای: امنیت voip sip h323 spit

تعداد نتایج: 20451  

Journal: :Inf. Sec. Techn. Report 2011
Ge Zhang Yacine Rebahi

In this article, we summarize the security threats targeting SIP proxy servers or other infrastructures in NGN by misusing a specific signaling authentication mechanism, which has been proposed in RFC 4474 (Peterson and Jennings, 2006). This mechanism is designed to authenticate inter-domain SIP requests based on domain certificates to prevent identity theft. Nevertheless, despite its contribut...

Journal: :J. Network and Computer Applications 2011
Chia-Hui Wang Yu-Shun Liu

Voice over IP (VoIP) service has been widely deployed over the prevalent Internet due to the advanced technologies of digital voice compression, communication protocols, and wired/wireless networks. VoIP then benefitmuch lower cost of equipment, operation, and better integrationwith data applications than voice communications over telephony networks. On the other hand, VoIP further introduce se...

Journal: :International Conference on Aerospace Sciences and Aviation Technology 2011

Journal: :Computer Standards & Interfaces 2014
Hsiu-lien Yeh Tien-Ho Chen Wei-Kuan Shih

In 2014, Yeh et al. proposed a robust smart card secured authentication scheme on SIP using elliptic curve cryptography to conquer many forms of attacks in previous protocols. Yeh et al. claimed that their proposed protocol is more efficient than Diffie-Hellman’s concept authentication protocols for SIP and performs secured mutual authentication, which can be implemented on different real netwo...

2011
Mauro Femminella Francesco Giacinti Gianluca Reali

In this paper we propose a functional mapping between Java Call Control (JCC) and Session Initiation Protocol (SIP). We show its effectiveness in enabling easy service design and implementation through experimental results. For this purpose, we have implemented a JCC-SIP Resource Adaptor for a Jain Service Logic Execution Environment (JSLEE). In particular, we have used the Mobicents JSLEE, whi...

Journal: :IJSN 2010
Karl R. Schrader Barry E. Mullins Gilbert L. Peterson Robert F. Mills

At issue for any organization is the illicit dissemination of sensitive information using file sharing applications within a network, and tracking terrorist cells or criminal organizations that are covertly communicating using Voice over IP (VoIP) applications. This paper presents a field programmable gate array (FPGA)-based embedded software tool designed to process file transfers using the Bi...

2009
Emanuel Onica

One of the main issues encountered in the development of VoIP applications and infrastructures relates with ensuring the security of the communication channel between peers. The discussion on this subject can be split in two principal directions: the signaling path security and the media path security. In this document we focus on the latter by overviewing the current most important available m...

2007
Jaume Barceló Boris Bellalta Carlos Macián Miquel Oliver Anna Sfairopoulou

This article describes a mechanism to provide location information about users of a wireless metropolitan access network to trusted and authorized third parties. A case of particular interest is that of providing emergency centers with the location of the VoIP caller. The location information is obtained from the wireless access points using SNMP polling, and stored in a location server. The ou...

Journal: :CoRR 2011
Ndaohialy Manda-Vy Ravonimanantsoa Paul Auguste Randriamitantsoa

Currently, the development of research around VoIP experience a tremendous growth. In the community of open source Asterisk represents a reliable alternative for a lower cost solution. In this same community as the SIP protocol is a supplement to the more asterisk PBX. to share the benefits claimed by proponents of free software co-existence with other Asterisk server is not yet proven. In this...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید