Secure Service Provisioning (SSP) framework for IP Multimedia Subsystem (IMS)
暂无分享,去创建一个
[1] E.Y. Chen,et al. Detecting DoS attacks on SIP systems , 2006, 1st IEEE Workshop on VoIP Management and Security, 2006..
[2] Victor Fajardo,et al. Diameter Base Protocol , 2003, RFC.
[3] Saurabh Bagchi,et al. SCIDIVE: a stateful and cross protocol intrusion detection architecture for voice-over-IP environments , 2004, International Conference on Dependable Systems and Networks, 2004.
[4] Steve Lloyd,et al. PKI Basics - A Technical Perspective , 2002 .
[5] John Loughney. Diameter Command Codes for Third Generation Partnership Project (3GPP) Release 5 , 2003, RFC.
[6] Muhammad Sher,et al. Secure access to IP multimedia services using generic bootstrapping architecture (GBA) for 3G & beyond mobile networks , 2006, Q2SWinet '06.
[7] Thomas Magedanz,et al. VoIP defender: highly scalable SIP-based security architecture , 2007, IPTComm '07.
[8] Cheryl Madson,et al. The Use of HMAC-SHA-1-96 within ESP and AH , 1998, RFC.
[9] Randall J. Atkinson,et al. IP Encapsulating Security Payload (ESP) , 1995, RFC.
[10] Muhammad Sher,et al. Mobile multimedia broadcasting vulnerability threats, attacks and security solutions , 2007, 2007 9th IFIP International Conference on Mobile Wireless Communications Networks.
[11] Cheryl Madson,et al. The Use of HMAC-MD5-96 within ESP and AH , 1998, RFC.
[12] Muhammad Sher,et al. Inter-domains security management (IDSM) model for IP multimedia subsystem (IMS) , 2006, First International Conference on Availability, Reliability and Security (ARES'06).
[13] Thomas Magedanz,et al. The IMS playground @ FOKUS-an open testbed for generation network multimedia services , 2005, First International Conference on Testbeds and Research Infrastructures for the DEvelopment of NeTworks and COMmunities.
[14] Carlos Pignataro,et al. Extended ICMP to Support Multi-Part Messages , 2007, RFC.
[15] Hugo Krawczyk,et al. A Security Architecture for the Internet Protocol , 1999, IBM Syst. J..
[16] Angelos D. Keromytis,et al. On the Use of Stream Control Transmission Protocol (SCTP) with IPsec , 2003, RFC.
[17] David Cooper,et al. Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile , 2008, RFC.
[18] Sheila Frankel,et al. The AES-CBC Cipher Algorithm and Its Use with IPsec , 2003, RFC.
[19] M. F.,et al. Bibliography , 1985, Experimental Gerontology.
[20] Muhammad Sher,et al. Development of IMS privacy & security management framework for Fokus open IMS testbed , 2006 .
[21] Muhammad Sher,et al. Protecting IP Multimedia Subsystem (IMS) Service Delivery Platform from Time Independent Attacks , 2007, Third International Symposium on Information Assurance and Security.
[22] Mark Handley,et al. SIP: Session Initiation Protocol , 1999, RFC.
[23] Muhammad Sher,et al. Developing Network Domain Security (NDS) Model for IP Multimedia Subsystem (IMS) , 2006, J. Networks.
[24] Jari Arkko,et al. Security Mechanism Agreement for the Session Initiation Protocol (SIP) , 2003, RFC.
[25] Xiaomin Zhu,et al. The IMS: IP multimedia concepts and services in the mobile domain , 2007 .
[26] Muhammad Sher,et al. IP Multimedia Subsystem (IMS) for Emerging All-IP Networks , 2008 .
[27] Giovanni Vigna,et al. A stateful intrusion detection system for World-Wide Web servers , 2003, 19th Annual Computer Security Applications Conference, 2003. Proceedings..
[28] Gonzalo Camarillo,et al. The 3G IP Multimedia Subsystem (IMS) , 2008 .
[29] Muhammad Sher,et al. IT-Based Open Service Delivery Platforms for Mobile Networks , 2006, The Handbook of Mobile Middleware.
[30] Russ Housley,et al. Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile , 2002, RFC.
[31] Ronald L. Rivest,et al. The MD5 Message-Digest Algorithm , 1992, RFC.
[32] Muhammad Sher,et al. Understanding the issues of providing IMS capabilities on different access networks: the use of policies for QoS provision , 2005 .
[33] Roy T. Fielding,et al. Uniform Resource Identifier (URI): Generic Syntax , 2005, RFC.
[34] Rob Adams,et al. The ESP CBC-Mode Cipher Algorithms , 1998, RFC.
[35] Russ Housley,et al. Internet X.509 Public Key Infrastructure Authority Information Access Certificate Revocation List (CRL) Extension , 2005, RFC.
[36] Muhammad Sher,et al. Security Associations Management (SAM) Model for IP Multimedia System (IMS) , 2005, Net-Con.
[37] Muhammad Sher,et al. A vulnerabilities analysis and corresponding middleware security extensions for securing NGN applications , 2007, Comput. Networks.
[38] Robert J. Sparks,et al. The Session Initiation Protocol (SIP) Referred-By Mechanism , 2004, RFC.
[39] Allan C. Rubens,et al. Remote Authentication Dial In User Service (RADIUS) , 1997, RFC.
[40] Muhammad Sher,et al. Network Access Security Management (NASM) Model for Next Generation Mobile Telecommunication Networks , 2005, MATA.