Security Considerations for Peer-to-Peer Distributed Hash Tables
IPTPS '01 Revised Papers from the First International Workshop on Peer-to-Peer Systems
Communications of the ACM - Transforming China
Performance analysis of TLS Web servers
ACM Transactions on Computer Systems (TOCS)
The storm ahead: how CALEA will turn VoIP on its head
InfoSecCD '06 Proceedings of the 3rd annual conference on Information security curriculum development
Holistic VoIP intrusion detection and prevention system
Proceedings of the 1st international conference on Principles, systems and applications of IP telecommunications
VoIP defender: highly scalable SIP-based security architecture
Proceedings of the 1st international conference on Principles, systems and applications of IP telecommunications
A European perspective of VoIP in market competition
Communications of the ACM - Remembering Jim Gray
Usability of CAPTCHAs or usability issues in CAPTCHA design
Proceedings of the 4th symposium on Usable privacy and security
Network security: VoIP security on data network--a guide
Proceedings of the 4th annual conference on Information security curriculum development
A low-cost attack on a Microsoft captcha
Proceedings of the 15th ACM conference on Computer and communications security
Proceedings of the 5th annual conference on Information security curriculum development
Performance analysis of identity management in the Session Initiation Protocol (SIP)
AICCSA '08 Proceedings of the 2008 IEEE/ACS International Conference on Computer Systems and Applications
Botnet spam campaigns can be long lasting: evidence, implications, and analysis
Proceedings of the eleventh international joint conference on Measurement and modeling of computer systems
A comparative analysis of the security aspects of the multimedia key exchange protocols
Proceedings of the 3rd International Conference on Principles, Systems and Applications of IP Telecommunications
Have I met you before?: using cross-media relations to reduce SPIT
Proceedings of the 3rd International Conference on Principles, Systems and Applications of IP Telecommunications
Enhanced CAPTCHAs: using animation to tell humans and computers apart
CMS'06 Proceedings of the 10th IFIP TC-6 TC-11 international conference on Communications and Multimedia Security
Hi-index | 0.00 |
These last few years, the security of VoIP architectures has become a sensitive issue with many vulnerability announcements. This article first aims to distinguish the threats and the applicable protection mechanisms depending on the underlying VoIP architecture. We then investigate the properties of a specific class of existing call establishment mechanisms based on tokens or tickets. In the last section, an enhancement to these mechanisms is proposed which lifts some of the previously seen limitations, especially the DoS risks, the token storage constraint or the transport impact of large tickets.