References

  • Asterisk. http://www.asterisk.org

  • Enhancements for Authenticated Identity Management in the Session Initiation Protocol (SIP) . draft-ietf-sip-identity-05. http://www.softarmor.com/wgdb/docs/draft-ietf-sip-identity-05.txt

  • Niccolini, S., S. Tartarelli, M. Stiemerling, and S. Srivastava. SIP Extensions for SPIT Identification. draft-niccolini-sipping-feedback-spit-02. http://www.ietf.org/internet-drafts/draft-niccolini-sipping-feedback-spit-02.txt

  • Rosenberg, J., C. Jennings, and J. Peterson. The Session Initiation Protocol (SIP) and Spam . draft-ietf-sipping-spam-01.txt. http://www.peerbeam.com/wgdb/docs/draft-ietf-sipping-spam-02.txt

  • Schwartz, D., B. Sterman, and E. Katz. SPAM for Internet Telephony (SPIT) Prevention Using the Security Assertion Markup Language (SAML) . draft-schwartz-sipping-spit-saml-01.txt. http://tools.ietf.org/wg/sipping/draft-schwartz-sipping-spit-saml-01.txt

  • Van Meggelen, Jim, Jared Smith, and Leif Madsen. Asterisk: The Future of Telephony . Sebastopol: O'Reilly Media, Inc, 2005



Hacking Exposed VoIP. Voice Over IP Security Secrets & Solutions
Hacking Exposed VoIP: Voice Over IP Security Secrets & Solutions
ISBN: 0072263644
EAN: 2147483647
Year: 2004
Pages: 158

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net