共 50 条
- [1] Evaluation of Security and Countermeasures for a SIP-based VoIP Architecture [J]. ROEDUNET 2008 CONFERENCE PROCEEDINGS, 2008, : 34 - 39
- [2] SIP-based VoIP Experiment for Disadvantaged Tactical Edge Networks [J]. 2009 5TH INTERNATIONAL CONFERENCE ON TESTBEDS AND RESEARCH INFRASTRUCTURES FOR THE DEVELOPMENT OF NETWORKS & COMMUNITIES, 2009, : 286 - 291
- [3] Audio CAPTCHA for SIP-Based VoIP [J]. EMERGING CHALLENGES FOR SECURITY, PRIVACY AND TRUST: 24TH IFIP TC 11 INTERNATIONAL INFORMATION SECURITY CONFERENCE, SEC 2009, PROCEEDINGS, 2009, 297 : 25 - 38
- [4] Implementing a secure VoIP communication over SIP-based networks [J]. Wireless Networks, 2018, 24 : 2915 - 2926
- [5] Implementing a secure VoIP communication over SIP-based networks [J]. WIRELESS NETWORKS, 2018, 24 (08) : 2915 - 2926
- [6] Implementation and Evaluation of SIP-based Secure VoIP Communication System [J]. EUC 2008: PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING, VOL 2, WORKSHOPS, 2008, : 356 - 360
- [7] An improved Authentication Protocol for SIP-based VoIP [J]. PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON RECENT ADVANCES IN COMPUTER SYSTEMS, 2016, 38 : 7 - 12
- [8] A Method for Trustworthy SIP-Based VoIP Transmission [J]. 2012 2ND INTERNATIONAL CONFERENCE ON APPLIED ROBOTICS FOR THE POWER INDUSTRY (CARPI), 2012, : 1171 - 1174
- [9] Design and implementation of a SIP-based VoIP architecture [J]. 18TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOL 2 (REGULAR PAPERS), PROCEEDINGS, 2004, : 187 - 190
- [10] On the billing vulnerabilities of SIP-based VoIP systems [J]. COMPUTER NETWORKS, 2010, 54 (11) : 1837 - 1847