[1] Alan B. Johnston, SIP:Understanding the Session
Initiation Protocol (Second Edition), ISBN-
9781580536561, Artech House Inc, 2003.
[2] D. Donohue, D. Mallory, K. Salhoff, Session Initiation
Protocol, Cisco Press, 2006.
http://www.ciscopress.com/articles/article.asp?p=664148
[3] The SIP Servlet Tutorial, Sun Microsystems, Network
Circle Santa Clara, CA 95054, U.S.A, 2009.
http://docs.oracle.com/cd/E19355-01/820-
3007/gfnfb/index.html
[4] J. Rosenberg, et al., SIP: Session Initiation Protocol, RFC
3261, 2002. http://tools.ietf.org/html/rfc3261
[5] M. Collier, “VoIP Vulnerabilities”, SecureLogix
Corporation, 2005.
[6] S. El Sawda and P. Urien, “SIP Security Attacks and
Solutions: A state-of- the-art review”, in IEEE, 2006,
Vol. 2, pp. 3187 – 3191.
[7] A. Roach, “Session Initiation Protocol (SIP)-Specific
Event Notification”, RFC 3265, 2002.
http://tools.ietf.org/html/rfc3265
[8] G. Asghar and Q. Jawed Azmi, “Security issues of SIP”,
M.S. Thesis no: MEE10:74, Department Of
Telecommunication Systems, Blekinge Institute Of
Technology School Of Engineering, 2010.
[9] H. Belaoud, J. El Abbadi, A. Habban, “Survey Of Sip
Authentication Mechanisms”, Journal of Theoretical and
Applied Information Technology, Vol. 58. No. 2, 2013.
[10] E.J. Yoon, E.K. Ryu, K.Y. Yoo, “Attacks and Solutions
of Yang et al.’s Protected Password Changing Scheme”,
Informatica, , Vol. 16 No.2, pp. 285–294, 2005.
[11] R. Zhang, X. Wang, R. Farley, X.Yang, X. Jiang, “On the
Feasibility of Launching the Man-In-The-Middle Attacks
on VoIP from Remote Attackers”, in ASIACCS '09
Proceedings of the 4th International Symposium on
Information, Computer, and Communications Security ,
2009, pp. 61-69.
[12] E.J. Yoon, K.Y. Yoo, C. Kim, Y.S. Hong, M. Jo, “A
secure and efficient SIP authentication scheme for
converged VoIP networks”, Computer Communications,
Vol. 33, 2010, pp. 1674-1681.
[13] R. Hande, “Password Cracking– Online vs. Offline
Password Cracking”,Scribd, 2012.
[14] J. Franks, HTTP Authentication basic and digest access
authentication, IETF RFC2617, 1999.
[15] Niemi, A., et al., “Hypertext Transfer Protocol (HTTP)
Digest Authentication Using Authentication and Key
Agreement (AKA)”, RFC 3310, 2002.
http://www.hjp.at/doc/rfc/rfc3310.html
[16] C. C. Yang, R. C. Wang, and W. T. Liu, "Secure
authentication scheme for session initiation protocol”, in
Computers & Security, 2005, Vol. 24, pp. 381-386.
[17] A. Durlanik and I. Sogukpinar, “SIP authentication
scheme using ECDH”, International Journal of Computer,
Information, Mechatronics, Systems Science and
Engineering, Vol. 1, No.8, 2007.
[18] L. Wu, Y. Zhang, F. Wang, "A new provably secure
authentication and key agreement protocol for SIP using
ECC", Computer Standards & Interfaces, Vol. 31, 2009,
pp. 286–291.
[19] R. Arshad, N. Ikram, "A novel mutual authentication
scheme for session initiation protocol based on elliptic
curve cryptography”, in 13th International Conference on
Advanced Communication Technology (ICACT), 2011,
Vol. 13, pp. 705-710.
[20] H. Tang, X. Liu, "Cryptanalysis of Arshad et al.’s ECCbased
mutual authentication scheme for session initiation
protocol", Multimedia Tools and Applications, Vol. 65,
2013, pp. 321-333.
[21] S.S. Mousavi-nik, M.H. Yaghmaee-moghaddam and
M.B. Ghaznavi-ghoushch, “Proposed SecureSIP
Authentication Scheme based on Elliptic Curve
Cryptography”, International Journal of Computer
Applications, Vol. 58, No.8, 2012, pp. 25-30.
[22] J. L. Tsai, “Efficient nonce-based authentication scheme
for session initiation protocol”, International Journal of
Network Security, Vol. 8, No. 3, 2009, pp. 312- 316.
[23] J. Ring, K.K. R. Cho, E. Foo, M.H. Looi, “A new
authentication mechanism and key agreement protocol for
SIP using identitybased cryptography”, in Information
Technology Security Conference, 2006, pp. 61–72.
[24] H.H. Kilinc, Y. Allaberdiyev, T. Yanik, “Performance
Evaluation of ID Based Authentication Methods in the
SIP Protocol”, in proceeding of Application of
Information and Communication Technologies (AICT),
2009, pp. 1-6.
[25] R. Yu, J. Yuan, G. Du, P. Li, "An identity-based
mechanism for enhancing SIP security", in IEEE 3rd
International Conference on Software Engineering and
Service Science (ICSESS), 2012, pp. 447-451.
[26] D. Geneiatakis, C. Lambrinoudakis, “A lightweight
protection mechanism against signaling attacks in a SIPBased
VoIP environment”, Telecommunication Systems,
Vol. 36, 2008, pp. 153–159.
[27] T. Guillet, R. Moalla, A. Serhrouchni, A. Obaid, "SIP
authentication based on HOTP”, in International
Conference on Information, Communications and Signal
Processing (ICICS), 2009, pp. 1-4, 8-10.
[28] Y.P. Liao, S.S Wang, “A new secure password
authenticated key agreement scheme for SIP using selfcertified
public keys on elliptic curves”, Computer
Communications, Vol. 33, Issue 3, 2009, pp. 372-380.
[29] M. Kumar, A. Tuli, R. Tuli, “Secure Communication
Using Needham-Schroeder Protocol”, CPMR-IJT, Vol. 1,
No. 1, 2011.
[30] Introduction to Networks and Security, Lecture 29,
CSE331, 2006.
http://www.cis.upenn.edu/~cse331/lectures/CSE331-
29.pdf
[31] G. Lowe, “An attack on the Needham-Schroeder publickey
authentication protocol”, Information Processing
Letters archive, Vol. 56, Issue 3, 1995, pp. 131 - 133.
[32] M. Abadi and R. Needham, “Prudent Engineering
Practice for Cryptographic Protocols”, IEEE Transactions
on Software Engineering Vol.22, No.1, 1996, pp. 6-15.
[33] W.H. Yang, J.C. Shen, S.P. Shie, “Designing
authentication protocols against guessing attacks”,
Technical Report 2(3), Institute of Information &
Computing Machinery, Taiwan, 1999.