A Secure Architecture for Nomadic User in IMS Network
暂无分享,去创建一个
Anas Abou El Kalam | Abdellah Ait Ouahman | Mohamed Maachaoui | Noureddine Idboufker | H. Ait Lahcen
[1] Danny Crookes,et al. Shoeprint Image Retrieval Based on Local Image Features , 2007 .
[2] Victor Fajardo,et al. Diameter Base Protocol , 2003, RFC.
[3] Mats Näslund,et al. The Secure Real-time Transport Protocol (SRTP) , 2004, RFC.
[4] Alexander Pretschner,et al. A Trustworthy Usage Control Enforcement Framework , 2011, 2011 Sixth International Conference on Availability, Reliability and Security.
[5] Florence Gaunet,et al. A Navigational Aid for Blind Pedestrians Designed with User- and Activity-Centered Approaches , 2010 .
[6] Hui-Feng Huang. A New Efficient Authentication Scheme for Session Initiation Protocol , 2006, JCIS.
[7] Patrik Fältström,et al. The E.164 to Uniform Resource Identifiers (URI) Dynamic Delegation Discovery System (DDDS) Application (ENUM) , 2004, RFC.
[8] Derek Atkins,et al. Threat Analysis of the Domain Name System (DNS) , 2004, RFC.
[9] Jon Peterson. S/MIME Advanced Encryption Standard (AES) Requirement for the Session Initiation Protocol (SIP) , 2004, RFC.
[10] T. Magedanz,et al. Protecting IP Multimedia Subsystem (IMS) Service Delivery Platform from Time Independent Attacks , 2007 .
[11] Mark Handley,et al. RFC 4566: SDP: Session Description Protocol , 2006 .
[12] Eric Rescorla,et al. Datagram Transport Layer Security , 2006, RFC.
[13] Eric Rescorla,et al. Diffie-Hellman Key Agreement Method , 1999, RFC.
[14] David Taniar,et al. International Journal of Mobile Computing and Multimedia Communications , 2010 .