Skip Abstract Section
Abstract
This document defines new functionality for negotiating the security mechanisms used between a Session Initiation Protocol (SIP) user agent and its next-hop SIP entity. This new functionality supplements the existing methods of choosing security mechanisms between SIP entities.
RFC Downloads
ZIP
Cited By
- Kim H, Kim D, Kwon M, Han H, Jang Y, Han D, Kim T and Kim Y Breaking and Fixing VoLTE Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, (328-339)
- Zhang R, Wang X, Farley R, Yang X and Jiang X On the feasibility of launching the man-in-the-middle attacks on VoIP from remote attackers Proceedings of the 4th International Symposium on Information, Computer, and Communications Security, (61-69)
- Wang X, Zhang R, Yang X, Jiang X and Wijesekera D Voice pharming attack and the trust of VoIP Proceedings of the 4th international conference on Security and privacy in communication netowrks, (1-11)
- Hirai Y, Kurokawa T, Matsuo S, Tanaka H and Yamamura A (2008). Classification of Hash Functions Suitable for Real-Life Systems, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, E91-A:1, (64-73), Online publication date: 1-Jan-2008.
- Zhang R, Wang X, Yang X and Jiang X Billing attacks on SIP-based VoIP systems Proceedings of the first USENIX workshop on Offensive Technologies, (1-8)
- Yang K and Kim K A frame-based selective encryption method for real time video transmission on VoIP Proceedings of the 2007 international conference on Frontiers of High Performance Computing and Networking, (115-122)
- Martínez-Manzano D, López G and Gómez-Skarmeta A Multidomain virtual security negotiation over the session initiation protocol (SIP) Proceedings of the First international conference on Critical Information Infrastructures Security, (249-261)