Baumann et al., 2006 - Google Patents
Voice over IP-security and SPITBaumann et al., 2006
View PDF- Document ID
- 11173937483727339705
- Author
- Baumann R
- Cavin S
- Schmid S
- Publication year
- Publication venue
- Swiss Army, FU Br
External Links
Snippet
Abstract Voice-over-IP (VoIP) has become an attractive alternative to the plain old telephone system, especially due to the much lower communication costs. However, there are several threats. In this document, several such threats are discussed. Moreover, we ask whether …
- 238000004891 communication 0 abstract description 10
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M3/00—Automatic or semi-automatic exchanges
- H04M3/42—Systems providing special services or facilities to subscribers
- H04M3/50—Centralised arrangements for answering calls; Centralised arrangements for recording messages for absent or busy subscribers ; Centralised arrangements for recording messages
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Geneiatakis et al. | Survey of security vulnerabilities in session initiation protocol | |
Salsano et al. | SIP security issues: the SIP authentication procedure and its processing load | |
JP2008543159A (en) | Detection of SPIT in VOIP calls | |
Baumann et al. | Voice over IP-security and SPIT | |
Geneiatakis et al. | SIP Security Mechanisms: A state-of-the-art review | |
Geneiatakis et al. | A lightweight protection mechanism against signaling attacks in a SIP-based VoIP environment | |
Naeem et al. | A survey on registration hijacking attack consequences and protection for Session Initiation Protocol (SIP) | |
Dwivedi | Hacking VoIP: protocols, attacks, and countermeasures | |
Rasol et al. | An improved secure SIP registration mechanism to avoid VoIP threats | |
Wang et al. | Voice pharming attack and the trust of VoIP | |
Keromytis | Voice over IP Security: A Comprehensive Survey of Vulnerabilities and Academic Research | |
Phithakkitnukoon et al. | Voip security—attacks and solutions | |
Werapun et al. | Solution analysis for SIP security threats | |
Duanfeng et al. | Security mechanisms for SIP-based multimedia communication infrastructure | |
Guillet et al. | Mutual Authentication for SIP: A semantic meaning for the SIP opaque values | |
Arafat et al. | SIP security in IP telephony | |
Thalhammer | Security inVoIP-Telephony Systems | |
Omari et al. | A closer look on challenges and security risks of Voice over Internet Protocol infrastructures | |
Al Saidat | A design of an enhanced redundant sip model for securing SIP-based networks | |
Qiu et al. | SIP Vulnerabilities Testing in Session Establishment & User Registration. | |
Singhai et al. | VoIP Security | |
Mihai | Voice over IP Security A layered approach | |
Knuutinen | Session Initiation Protocol security considerations | |
Wang et al. | Voip security: vulnerabilities, exploits, and defenses | |
Moon et al. | Securing VoIP networks via signaling protocol layer |