2010 International Symposium on Computer, Communication, Control and Automation (3CA) 2010
DOI: 10.1109/3ca.2010.5533772
|View full text |Cite
|
Sign up to set email alerts
|

A Kerberos-based single sign-on system for VoIP SIP servers and clients with a terminal mobility capability

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2011
2011
2022
2022

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 3 publications
0
3
0
Order By: Relevance
“…However, the INTEGRITY-AUTH header cannot be a void the offline password guessing attack .Wu et al [8] presented a new authenticated key exchange protocol (NAKE) to solve the existing problems in SIP original authentication. Jung-Shian Li et al [9] have proposed to use the Kerberos protocol with VOIP SIP.…”
Section: Related Work For Sip Authentication Schemesmentioning
confidence: 99%
“…However, the INTEGRITY-AUTH header cannot be a void the offline password guessing attack .Wu et al [8] presented a new authenticated key exchange protocol (NAKE) to solve the existing problems in SIP original authentication. Jung-Shian Li et al [9] have proposed to use the Kerberos protocol with VOIP SIP.…”
Section: Related Work For Sip Authentication Schemesmentioning
confidence: 99%
“…Similar arguments have applied to home networks, but as such networks link into cloud services more attention needs to be paid to enhanced authentication of users. Some researchers have looked at the use of RFID [26], trusted third party [29], or smart-card [32], [37] technologies. In [26] an RFID tag is used to identify and authenticate users to access a personalized and interactive IPTV service.…”
Section: B Other Modes Of Authentication For Home Networkmentioning
confidence: 99%
“…Other researchers have looked at the use of RFID [26], trusted third party [29], or smart-card [32] technologies. However, the lack of a common interface mechanism to the home network implies that either additional components such as a biometric reader or RFID card would be required and the marginal benefits of user-authentication, over device-authentication have conspired to reinforce the status quo.…”
Section: Introductionmentioning
confidence: 99%