نتایج جستجو برای: امنیت sip

تعداد نتایج: 17876  

Journal: :Wireless Personal Communications 2005
Hyejeong Lee Jee-Young Song Sun-Ho Lee Sungwon Lee Dong-Ho Cho

With developments in voice over IP (VoIP), IP-based wireless data networks and their application services have received increased attention. While multimedia applications of mobile nodes are served by Session Initiation Protocol (SIP) as a signaling protocol, the mobility of mobile nodes may be supported via Mobile IP protocol. For a mobile node that uses both Mobile IP and SIP, there is a seve...

2004
R. Mahy B. Biggs R. Dean

This document defines a new header for use with Session Initiation Protocol (SIP) multi-party applications and call control. The Replaces header is used to logically replace an existing SIP dialog with a new SIP dialog. This primitive can be used to enable a variety of features, for example: "Attended Transfer" and "Call Pickup". Note that the definition of these example features is nonnormative.

2003
Hyejeong Lee Sung Won Lee Dong-Ho Cho

For a mobile node that uses both Mobile IP and Session Initiation Protocol (SIP), there is severe redundant registration overhead because the mobile node has to make location registration separately to the Home Agent for Mobile IP and to the Home Registrar for SIP. Therefore, we propose two new IP mobility management methods that integrate both Mobile IP and SIP. Performance comparisons are mad...

Journal: :RFC 2015
Alan Johnston James Rafferty

There is a class of applications that benefit from using SIP to exchange User-to-User Information (UUI) data during session establishment. This information, known as call control UUI data, is a small piece of data inserted by an application initiating the session and utilized by an application accepting the session. The syntax and semantics for the UUI data used by a specific application are de...

Journal: :Current opinion in biotechnology 2016
Egbert Schwartz Michaela Hayer Bruce A Hungate Benjamin J Koch Theresa A McHugh William Mercurio Ember M Morrissey Katerina Soldanova

Growth and mortality of microorganisms have been characterized through DNA stable isotope probing (SIP) with 18O-water in soils from a range of ecosystems. Conventional SIP has been improved by sequencing a marker gene in all fractions retrieved from an ultracentrifuge tube to produce taxon density curves, which allow estimating the atom percent isotope composition of each microbial taxon's gen...

Journal: :Journal of abnormal child psychology 2010
Reid Griffith Fontaine

The Special Section on developmental research on social information processing (SIP) and antisocial behavior is here introduced. Following a brief history of SIP theory, comments on several themes-measurement and assessment, attributional and interpretational style, response evaluation and decision, and the relation between emotion and SIP-that tie together four new empirical investigations are...

Journal: :RFC 2011
Shunsuke Okumura Takuya Sawada Paul H. Kyzivat

The Session Initiation Protocol (SIP) utilizes the offer/answer model to establish and update multimedia sessions using the Session Description Protocol (SDP). The description of the offer/answer model in SIP is dispersed across multiple RFCs. This document summarizes all the current usages of the offer/answer model in SIP communication.

Journal: :RFC 2006
Cullen Jennings François Audet John Elwell

The Session Initiation Protocol (SIP) is often used to initiate connections to applications such as voicemail or interactive voice recognition systems. This specification describes a convention for forming SIP service URIs that request particular services based on redirecting targets from such applications. Jennings, et al. Informational [Page 1] RFC 4458 SIP Voicemail URI April 2006 Table of

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه تربیت مدرس - دانشکده مهندسی برق و کامپیوتر 1392

امروزه در شبکه های نسل جدید از پروتکل sip برای برقراری، به روزرسانی و پایان دادن به نشست های میان کاربران استفاده می شود. به موازات گسترش شبکه های نسل جدید حمله های مختلفی در مقابل سرویس دهندگان sip معرفی شده است که بسیاری از آنها با هدف اتلاف منابع این سرویس دهندگان انجام می شوند. اکثر روش های تشخیص نفوذ موجود تنها قادر به شناسایی حمله های اتلاف منابع با نرخ بالا (از قبیل حمله ی سیل آسا) هستند...

Journal: :Wireless Networks 2007
Nilanjan Banerjee Arup Acharya Sajal K. Das

The deployment of infrastructure-less ad hoc networks is suffering from the lack of applications in spite of active research over a decade. This problem can be solved to a certain extent by porting successful legacy Internet applications and protocols to the ad hoc network § Corresponding Author; † This work was partially done while the author was a graduate student in CReWMaN, University of Te...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید