Abusing SIP Authentication.
Humberto J. AbdelnurTigran AvanesovMichaël RusinowitchRadu StatePublished in: IAS (2008)
Keyphrases
- authentication and key agreement
- session initiation protocol
- public key cryptography
- user authentication
- biometric authentication
- image authentication
- identity authentication
- fragile watermarking
- public key
- security analysis
- security mechanisms
- authentication scheme
- real time
- neural network
- authentication protocol
- data encryption