Security analysis and solutions for deploying IP telephony in the critical infrastructure
暂无分享,去创建一个
[1] Mats Näslund,et al. The Secure Real-time Transport Protocol (SRTP) , 2004, RFC.
[2] Jon Peterson,et al. Enhancements for Authenticated Identity Management in the Session Initiation Protocol (SIP) , 2006, RFC.
[3] Baugher,et al. The Secure Real-Time Transport Protocol , 2003 .
[4] Jon Peterson,et al. Private Extensions to the Session Initiation Protocol (SIP) for Asserted Identity within Trusted Networks , 2002, RFC.
[5] Jon Peterson,et al. Session Initiation Protocol (SIP) Authenticated Identity Body (AIB) Format , 2004, RFC.
[6] Thomas J. Walsh,et al. Security Considerations for Voice Over IP Systems , 2005 .
[7] Henning Schulzrinne,et al. The tel URI for Telephone Numbers , 2004, RFC.
[8] Mark Handley,et al. SDP: Session Description Protocol , 1998, RFC.
[9] Derek Atkins,et al. Threat Analysis of the Domain Name System (DNS) , 2004, RFC.
[10] Jon Peterson,et al. A Privacy Mechanism for the Session Initiation Protocol (SIP) , 2002, RFC.