Security challenges for peer-to-peer SIP
暂无分享,去创建一个
[1] Eunsoo Shim. An Architecture for Peer-to-Peer Session Initiation Protocol (P2P SIP) , 2006 .
[2] George Danezis,et al. Sybil-Resistant DHT Routing , 2005, ESORICS.
[3] Miguel Castro,et al. Secure routing for structured peer-to-peer overlay networks , 2002, OSDI '02.
[4] John R. Douceur,et al. The Sybil Attack , 2002, IPTPS.
[5] Jan Seedorf,et al. Using Cryptographically Generated SIP-URIs to Protect the Integrity of Content in P2P-SIP , 2006 .
[6] David Bryan,et al. A P2P Approach to SIP Registration and Resource Location , 2006 .
[7] David R. Karger,et al. Analysis of the evolution of peer-to-peer systems , 2002, PODC '02.
[8] Mudhakar Srivatsa,et al. Vulnerabilities and security threats in structured overlay networks: a quantitative analysis , 2004, 20th Annual Computer Security Applications Conference.
[9] Joachim Posegga,et al. Voice Over IP : Unsafe at any Bandwidth ? , 2005 .
[10] Christian Scheideler,et al. How to spread adversarial nodes?: rotate! , 2005, STOC '05.
[11] Cullen Jennings,et al. SOSIMPLE: A Serverless, Standards-based, P2P SIP Communication System , 2005, First International Workshop on Advanced Architectures and Algorithms for Internet Delivery and Applications (AAA-IDEA'05).
[12] Henning Schulzrinne,et al. Peer-to-peer internet telephony using SIP , 2005, NOSSDAV '05.
[13] Henning Schulzrinne,et al. Using an External DHT as a SIP Location Service , 2006 .
[14] Henry Sinnreich,et al. SIP, P2P, and Internet Communications , 2006 .
[15] David R. Karger,et al. Chord: a scalable peer-to-peer lookup protocol for internet applications , 2003, TNET.
[16] Mark Handley,et al. SIP: Session Initiation Protocol , 1999, RFC.
[17] Joseph M. Hellerstein,et al. Maelstrom: Churn as shelter , 2005 .