This dissertation is the product of a research project3, which focuses on the study of VoIP protocols' security issues. It starts with the review of the three VoIP protocols. Then, it introduces some common security concepts used in VoIP security. After that, the dissertation concentrates on the study of SIP security. The build-in security mechanisms of SIP protocol are investigated. Two general security solutions for SIP protocol, that is, PGP/MIME and S/MIME, based on Public Key Infrastructure (PKI), are reviewed and analyzed. We further point out their advantages and disadvantages for SIP security. In order to overcome the disadvantages of these two solutions, a new solution for SIP security is proposed. The new solution makes use of the...
Voice over IP (VoIP) services based on Session Initiation Protocol (SIP) has gained much attention a...
Historically, as new technologies evolve and start to become viable business tools there has been ...
Historically, as new technologies evolve and start to become viable business tools there has been ...
[[abstract]]VoIP (Voice over IP) is to pay much attention to network application service. The tradit...
This master’s thesis deals with security properties of protocols used for VoIP systems. In the first...
VOIP protocols are gaining greater acceptance amongst both users and service providers. This thesis ...
With the emergence of multimedia applications and the upcoming age of Voice over IP (VoIP), Voice se...
Submitted in partial fulfillment of the requirements for the Degree of Masters of Science in Compute...
VOIP or Voice Over Internet Protocol is a common term for phone service over IP based networks. The...
VOIP or Voice Over Internet Protocol is a common term for phone service over IP based networks. Ther...
Voice service is vulnerable to a number of attacks that can compromise the confidentiality, integrit...
Voice service is vulnerable to a number of attacks that can compromise the confidentiality, integrit...
The commercial deployment of VoIP necessitates the employment of security mechanisms that can assure...
Voice over IP (VoIP) is revolutionizing the modern communications system by allowing human voice and...
VoIP is increasingly becoming an alternative to the traditional PSTN for Telephony this is as a resu...
Voice over IP (VoIP) services based on Session Initiation Protocol (SIP) has gained much attention a...
Historically, as new technologies evolve and start to become viable business tools there has been ...
Historically, as new technologies evolve and start to become viable business tools there has been ...
[[abstract]]VoIP (Voice over IP) is to pay much attention to network application service. The tradit...
This master’s thesis deals with security properties of protocols used for VoIP systems. In the first...
VOIP protocols are gaining greater acceptance amongst both users and service providers. This thesis ...
With the emergence of multimedia applications and the upcoming age of Voice over IP (VoIP), Voice se...
Submitted in partial fulfillment of the requirements for the Degree of Masters of Science in Compute...
VOIP or Voice Over Internet Protocol is a common term for phone service over IP based networks. The...
VOIP or Voice Over Internet Protocol is a common term for phone service over IP based networks. Ther...
Voice service is vulnerable to a number of attacks that can compromise the confidentiality, integrit...
Voice service is vulnerable to a number of attacks that can compromise the confidentiality, integrit...
The commercial deployment of VoIP necessitates the employment of security mechanisms that can assure...
Voice over IP (VoIP) is revolutionizing the modern communications system by allowing human voice and...
VoIP is increasingly becoming an alternative to the traditional PSTN for Telephony this is as a resu...
Voice over IP (VoIP) services based on Session Initiation Protocol (SIP) has gained much attention a...
Historically, as new technologies evolve and start to become viable business tools there has been ...
Historically, as new technologies evolve and start to become viable business tools there has been ...