Handbook of Applied Cryptography
Handbook of Applied Cryptography
Efficient, DoS-resistant, secure key exchange for internet protocols
Proceedings of the 9th ACM conference on Computer and communications security
Enhancing the Resistence of a Provably Secure Key Agreement Protocol to a Denial-of-Service Attack
ICICS '99 Proceedings of the Second International Conference on Information and Communication Security
Voice over IPsec: Analysis and Solutions
ACSAC '02 Proceedings of the 18th Annual Computer Security Applications Conference
An adaptive cryptographic engine for internet protocol security architectures
ACM Transactions on Design Automation of Electronic Systems (TODAES)
ACM Transactions on Information and System Security (TISSEC)
Performance analysis of TLS Web servers
ACM Transactions on Computer Systems (TOCS)
Improving secure server performance by re-balancing SSL/TLS handshakes
ASIACCS '06 Proceedings of the 2006 ACM Symposium on Information, computer and communications security
The storm ahead: how CALEA will turn VoIP on its head
InfoSecCD '06 Proceedings of the 3rd annual conference on Information security curriculum development
Denial-of-service resistance in key establishment
International Journal of Wireless and Mobile Computing
Efficient software architecture for IPSec acceleration using a programmable security processor
Proceedings of the conference on Design, automation and test in Europe
SpringSim '07 Proceedings of the 2007 spring simulation multiconference - Volume 3
Network security: VoIP security on data network--a guide
Proceedings of the 4th annual conference on Information security curriculum development
Proceedings of the 5th annual conference on Information security curriculum development
Protecting SIP Proxy Servers from Ringing-Based Denial-of-Service Attacks
ISM '08 Proceedings of the 2008 Tenth IEEE International Symposium on Multimedia
A comparative analysis of the security aspects of the multimedia key exchange protocols
Proceedings of the 3rd International Conference on Principles, Systems and Applications of IP Telecommunications
Have I met you before?: using cross-media relations to reduce SPIT
Proceedings of the 3rd International Conference on Principles, Systems and Applications of IP Telecommunications
A Survey of Voice over IP Security Research
ICISS '09 Proceedings of the 5th International Conference on Information Systems Security
Evaluating DOS attacks against SIP-based VoIP systems
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
Inter-domain and DoS-resistant call establishment protocol (IDDR-CEP): work in progress
Principles, Systems and Applications of IP Telecommunications
The impact of TLS on SIP server performance
Principles, Systems and Applications of IP Telecommunications
SIP proxies: new reflectors in the internet
CMS'10 Proceedings of the 11th IFIP TC 6/TC 11 international conference on Communications and Multimedia Security
Cryptanalysis of RSA with private key d less than N0.292
IEEE Transactions on Information Theory
SIP security issues: the SIP authentication procedure and its processing load
IEEE Network: The Magazine of Global Internetworking
Review: VoIP: State of art for global connectivity-A critical review
Journal of Network and Computer Applications
Hi-index | 0.00 |
We present an authentication and key agreement protocol to secure Voice over IP call establishment between interconnection proxies of different domains. The protocol operates on a transaction basis. Each transaction is defined as the set of operations and data required to send an Authenticated Message from a sender to a responder. A transaction allows a sender to either transmit a cryptographically protected stand-alone message; or a key-agreement message required to establish a secure session. The protocol handles transaction synchronisation loss and guarantees the use of a single transaction window in the general (inter-domain) context with multiple originating servers.