切换至中文 Over 1 million code package, 10 million code file free download
  • [Others] sip_understand.rar sip the contents of the conversation protocol process for the analysis of SIP protocol
    Category: Other eBooks Upload User:training Size:98K
  • [Unix_Linux] Rfc3261.rar Chinese Rfc3261 agreement. Document a detailed description of the SIP call flow, and the first domain description.
    Category: Other eBooks Upload User:swww2008 Size:552K
  • [Others] SIP1.zip ... accordance with dysprosium single. Watanabe. Secretary fold expansion characteristics. R SIP network analysis blink Ji facing a typical security attack and chewing shout. For SIP network security risk. In accordance with the E, D-To-ED and ...
    Category: IP Phone/VOIP/Live Upload User:ruifengsyj Size:161K
  • [Others] SIP2.zip ... development of next generation networks, Session Initiation HS-iX (SIP) security applications becoming more and more important. In ... features on the basis of its possible security threats, discussed the SIP security mechanism agreement. Focus on the SIP ...
    Category: IP Phone/VOIP/Live Upload User:zhoucj12 Size:241K
  • [Others] SIP3.zip ... become the core of IP telephone service signaling protocols. Illustrated SIP network security risks, and then discussed the use of SIP security mechanisms and their application conditions. On this basis, the existing security mechanisms and end-to- ...
    Category: IP Phone/VOIP/Live Upload User:chaomacm Size:188K
  • [Others] SIP4.zip ... an important part. The face of complex, open Internet environment, SIP protocol lack strong security mechanisms, so that security seems weak ... existing technology and means to improve the security of SIP and SIP to further improve the safety of some ideas.
    Category: IP Phone/VOIP/Live Upload User:hxf_0101 Size:223K
  • [Others] SIP5.zip SIP is the IETF proposed by telephone signaling protocols is an important agreement NGN. In this paper, a brief introduction SIP agreement, the agreement focuses on SIP security threats facing the model, the last three aspects are given security solution. ...
    Category: IP Phone/VOIP/Live Upload User:xnyhbz Size:198K
  • [Others] SIP6.zip SIP protocol is Session Initiation Protocol, as its own characteristics and application of environment is faced with many ... such attacks, and experiment with a summary of the SIP certification registration hijacking attacks, the end of the registration to ...
    Category: IP Phone/VOIP/Live Upload User:okok9090 Size:159K
  • [Others] VOIP7.zip ... description of SIP-based VoIP complex security issues and expounded on authentication, loading MIME message body to extend the SIP messages and packages, such as encryption solution. Proposed a new security framework, in the link layer and network layer ...
    Category: IP Phone/VOIP/Live Upload User:wtrjx88 Size:302K
  • [Others] SIP8.zip At present, the Session Initiation Protocol (SIP) authentication mechanism most only provide a server to the client authentication, H ITI P summary of certification is one of them. Analysis of such a mechanism are vulnerable to server spoofing attacks and ...
    Category: IP Phone/VOIP/Live Upload User:qzy788 Size:251K