Peer-to-peer internet telephony using SIP, Proceedings of the international workshop on Network and operating systems support for digital audio and video , NOSSDAV '05, pp.63-68, 2005. ,
DOI : 10.1145/1065983.1065999
A Survey and Comparison of Peer-to-Peer Overlay Network Schemes, IEEE Communications Surveys and Tutorials, pp.72-93 ,
Security challenges for peer-to-peer SIP, IEEE Network, vol.20, issue.5, pp.38-45, 2006. ,
DOI : 10.1109/MNET.2006.1705882
Peer-to-peer overlays for real-time communication: security issues and solutions, IEEE Communications Surveys & Tutorials, vol.11, issue.1, 2009. ,
DOI : 10.1109/SURV.2009.090102
Evaluation of Sybil Attacks Protection Schemes in KAD, Proc. of the 3rd International Conference on Autonomous Infrastructure, Management and Security (AIMS'09, pp.70-82, 2009. ,
DOI : 10.1145/1151659.1159945
URL : https://hal.archives-ouvertes.fr/inria-00405381
Secure Routing for Structured Peer-to-peer Overlay Networks, SIGOPS Oper. Syst. Rev, vol.36, pp.299-314, 2002. ,
A Survey of Voice over IP Security Research, Proc. of the 5th International Conference on Information Systems Security (ICISS'09, pp.1-17, 2009. ,
DOI : 10.1007/978-3-642-10772-6_1
Evaluating P2PSIP under Attack: An Emulative Study, IEEE GLOBECOM 2008, 2008 IEEE Global Telecommunications Conference, 2008. ,
DOI : 10.1109/GLOCOM.2008.ECP.422
VoIP Security and Privacy Threat Taxonomy, 2005. ,
ISE03-2: SPam over Internet Telephony (SPIT) Prevention Framework, IEEE Globecom 2006, 2006. ,
DOI : 10.1109/GLOCOM.2006.192
Analysis of Techniques for Protection Against Spam over Internet Telephony, Proc. of 13th Open European Summer School EUNICE 2007, 2007. ,
DOI : 10.1007/978-3-540-73530-4_9
Using game theory to configure P2P SIP, Proceedings of the 3rd International Conference on Principles, Systems and Applications of IP Telecommunications, IPTComm '09, pp.1-6, 2009. ,
DOI : 10.1145/1595637.1595645
RheoStat: Real-Time Risk Management, Proc. of the 7th International Symposium on Recent Advances in Intrusion Detection, 2004. ,
DOI : 10.1007/978-3-540-30143-1_16
Progressive Multi Gray-Leveling: A Voice Spam Protection Algorithm, IEEE Network Magazine, vol.20, 2006. ,
Probabilistic Risk Analysis: Foundations and Methods, 2001. ,
DOI : 10.1017/CBO9780511813597
Protecting SIP-based Networks and Services from Unwanted Communications, Proc. of the GLOBECOM'08 Conference, 2008. ,
Using Cryptographically Generated SIP-URIs to protect the Integrity of Content in P2P-SIP, Proc. of the 3rd Annual VoIP Security Workshop (VSW'06), 2006. ,