A framework for identity privacy in SIP
暂无分享,去创建一个
Georgios Kambourakis | Stefanos Gritzalis | Georgios Karopoulos | Elisavet Konstantinou | S. Gritzalis | G. Kambourakis | Elisavet Konstantinou | Georgios Karopoulos
[1] Vincent Rijmen,et al. The Design of Rijndael: AES - The Advanced Encryption Standard , 2002 .
[2] Lawrence C. Stewart,et al. HTTP Authentication: Basic and Digest Access Authentication , 1999 .
[3] Michael Mealling. Dynamic Delegation Discovery System (DDDS) Part One: The Comprehensive DDDS , 2002, RFC.
[4] Cullen Jennings,et al. The Session Initiation Protocol (SIP) and Spam , 2008, RFC.
[5] Mihir Bellare,et al. Optimal Asymmetric Encryption-How to Encrypt with RSA , 1995 .
[6] Michael Mealling,et al. Dynamic Delegation Discovery System (DDDS) Part Three: The Domain Name System (DNS) Database , 2002, RFC.
[7] Blake Ramsdell,et al. Secure/Multipurpose Internet Mail Extensions (S/MIME) Version 3.1 Message Specification , 2004, RFC.
[8] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[9] Jon Peterson,et al. Private Extensions to the Session Initiation Protocol (SIP) for Asserted Identity within Trusted Networks , 2002, RFC.
[10] Michael Mealling. Dynamic Delegation Discovery System (DDDS) Part Four: The Uniform Resource Identifiers (URI) , 2002, RFC.
[11] Jon Peterson,et al. A Privacy Mechanism for the Session Initiation Protocol (SIP) , 2002, RFC.
[12] Eric Rescorla,et al. Datagram Transport Layer Security , 2006, RFC.
[13] Georgios Kambourakis,et al. Caller identity privacy in SIP heterogeneous realms: A practical solution , 2008, 2008 IEEE Symposium on Computers and Communications.
[14] T. Dagiuklas,et al. SIP Security Mechanisms : A state-ofthe-art review , 2005 .
[15] Michael Mealling,et al. Dynamic Delegation Discovery System (DDDS) Part Two: The Algorithm , 2002, RFC.
[16] Stefanos Gritzalis,et al. Enhancing Web privacy and anonymity in the digital era , 2004, Inf. Manag. Comput. Secur..
[17] Costas Lambrinoudakis,et al. A framework for protecting a SIP-based infrastructure against malformed message attacks , 2007, Comput. Networks.
[18] Henning Schulzrinne,et al. Application-layer mobility using SIP , 2000, MOCO.
[19] Mihir Bellare,et al. DHAES: An Encryption Scheme Based on the Diffie-Hellman Problem , 1999, IACR Cryptol. ePrint Arch..