The session initiation protocol (SIP) is widely used for multimedia communication as a signaling protocol for managing, establishing, maintaining, and terminating multimedia sessions among participants. However, SIP is exposed to a variety of security threats. To overcome the security flaws of SIP, it needs to support a number of security services: authentication, confidentiality, and integrity. Few solutions have been introduced in the literature to secure SIP, which can support these security services. Most of them are based on internet security standards and have many drawbacks. This work introduces a new protocol for securing SIP called secure-SIP (S-SIP). S-SIP consists of two protocols: the SIP authentication (A-SIP) protocol and the ...
Session Initiation Protocol is currently receiving much attention and seems to be the most promising...
[[abstract]]The Session Initiation Protocol (SIP) was proffered as the application layer's protocol ...
VOIP (voice Over Internet Protocol) has many advantages but at the same time it has security threats...
The session initiation protocol (SIP) is widely used for multimedia communication as a signaling pro...
The Session Initiation Protocol provides an expandable and easy solution to the IP-based telephony e...
In recent years, Session Initiation Protocol (SIP) has become widely used in current internet protoc...
Session initiation protocol (SIP) is the most widely used application layer control protocol for cre...
Abstract: Problem statement: This study aims to discuss several issues on session initiation protoco...
Abstract—The Digest Access Authentication method used in the voice over IP signaling protocol, SIP, ...
<div><p>The Session Initiation Protocol (SIP) is an extensive and esteemed communication protocol em...
[[abstract]]he Session Initiation Protocol (SIP) is a signaling protocol that controls communication...
The Session Initiation Protocol (SIP) is an extensive and esteemed communication protocol employed t...
Abstract- Session Initiation Protocol (SIP) based Voice over Internet Protocol (VoIP) services has a...
The commercial deployment of VoIP necessitates the employment of security mechanisms that can assure...
[[abstract]]VoIP (Voice over IP) is to pay much attention to network application service. The tradit...
Session Initiation Protocol is currently receiving much attention and seems to be the most promising...
[[abstract]]The Session Initiation Protocol (SIP) was proffered as the application layer's protocol ...
VOIP (voice Over Internet Protocol) has many advantages but at the same time it has security threats...
The session initiation protocol (SIP) is widely used for multimedia communication as a signaling pro...
The Session Initiation Protocol provides an expandable and easy solution to the IP-based telephony e...
In recent years, Session Initiation Protocol (SIP) has become widely used in current internet protoc...
Session initiation protocol (SIP) is the most widely used application layer control protocol for cre...
Abstract: Problem statement: This study aims to discuss several issues on session initiation protoco...
Abstract—The Digest Access Authentication method used in the voice over IP signaling protocol, SIP, ...
<div><p>The Session Initiation Protocol (SIP) is an extensive and esteemed communication protocol em...
[[abstract]]he Session Initiation Protocol (SIP) is a signaling protocol that controls communication...
The Session Initiation Protocol (SIP) is an extensive and esteemed communication protocol employed t...
Abstract- Session Initiation Protocol (SIP) based Voice over Internet Protocol (VoIP) services has a...
The commercial deployment of VoIP necessitates the employment of security mechanisms that can assure...
[[abstract]]VoIP (Voice over IP) is to pay much attention to network application service. The tradit...
Session Initiation Protocol is currently receiving much attention and seems to be the most promising...
[[abstract]]The Session Initiation Protocol (SIP) was proffered as the application layer's protocol ...
VOIP (voice Over Internet Protocol) has many advantages but at the same time it has security threats...