Computer Science ›› 2008, Vol. 35 ›› Issue (11): 95-97.

Previous Articles     Next Articles

WEI Zhen-ming ,FENG Jiu-chao (School of Electronic and Information Engineering, South China University of Technology, Guangzhou 510641, China)   

  • Online:2018-11-16 Published:2018-11-16

Abstract: SIP is one of the most widely used signaling protocols for its simplicity and scalability. However, it lacks of an effective mechanism for security authentication, which makes it vulnerable to attacks. The potential attacks to SIP were analyzed. Some exis

Key words: SIP, Security mechanism, HTTP authentication, Public key, End-to-end

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!