نتایج جستجو برای: امنیت voip sip h323 spit
تعداد نتایج: 20451 فیلتر نتایج به سال:
In this article, we summarize the security threats targeting SIP proxy servers or other infrastructures in NGN by misusing a specific signaling authentication mechanism, which has been proposed in RFC 4474 (Peterson and Jennings, 2006). This mechanism is designed to authenticate inter-domain SIP requests based on domain certificates to prevent identity theft. Nevertheless, despite its contribut...
Voice over IP (VoIP) service has been widely deployed over the prevalent Internet due to the advanced technologies of digital voice compression, communication protocols, and wired/wireless networks. VoIP then benefitmuch lower cost of equipment, operation, and better integrationwith data applications than voice communications over telephony networks. On the other hand, VoIP further introduce se...
In 2014, Yeh et al. proposed a robust smart card secured authentication scheme on SIP using elliptic curve cryptography to conquer many forms of attacks in previous protocols. Yeh et al. claimed that their proposed protocol is more efficient than Diffie-Hellman’s concept authentication protocols for SIP and performs secured mutual authentication, which can be implemented on different real netwo...
In this paper we propose a functional mapping between Java Call Control (JCC) and Session Initiation Protocol (SIP). We show its effectiveness in enabling easy service design and implementation through experimental results. For this purpose, we have implemented a JCC-SIP Resource Adaptor for a Jain Service Logic Execution Environment (JSLEE). In particular, we have used the Mobicents JSLEE, whi...
At issue for any organization is the illicit dissemination of sensitive information using file sharing applications within a network, and tracking terrorist cells or criminal organizations that are covertly communicating using Voice over IP (VoIP) applications. This paper presents a field programmable gate array (FPGA)-based embedded software tool designed to process file transfers using the Bi...
One of the main issues encountered in the development of VoIP applications and infrastructures relates with ensuring the security of the communication channel between peers. The discussion on this subject can be split in two principal directions: the signaling path security and the media path security. In this document we focus on the latter by overviewing the current most important available m...
This article describes a mechanism to provide location information about users of a wireless metropolitan access network to trusted and authorized third parties. A case of particular interest is that of providing emergency centers with the location of the VoIP caller. The location information is obtained from the wireless access points using SNMP polling, and stored in a location server. The ou...
Currently, the development of research around VoIP experience a tremendous growth. In the community of open source Asterisk represents a reliable alternative for a lower cost solution. In this same community as the SIP protocol is a supplement to the more asterisk PBX. to share the benefits claimed by proponents of free software co-existence with other Asterisk server is not yet proven. In this...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید