T. Berners-lee, R. Fielding, and L. Masinter, Uniform Resource Identifier (URI): Generic syntax, 2005.

T. Dierks and E. Rescorla, The Transport Layer Security (TLS) Protocol Version 1, 2008.

C. Jennings, J. Peterson, and M. Watson, Private Extensions to the Session Initiation Protocol (SIP) for Asserted Identity within Trusted Networks, 2002.
DOI : 10.17487/rfc3325

S. Kent and R. Atkinson, Security Architecture for the Internet Protocol, 1998.

V. Paxson, An analysis of using reflectors for distributed denial-of-service attacks, ACM SIGCOMM Computer Communication Review, vol.31, issue.3, pp.38-47, 2001.
DOI : 10.1145/505659.505664

J. Peterson and C. Jennings, Enhancements for Authenticated Identity Management in the Session Initiation Protocol (SIP), 2006.
DOI : 10.17487/rfc4474

Y. Rebahi, J. J. Pallares, T. M. Nguyen, S. Ehlert, G. Kovacs et al., Performance analysis of identity management in the Session Initiation Protocol (SIP), 2008 IEEE/ACS International Conference on Computer Systems and Applications, pp.711-717, 2008.
DOI : 10.1109/AICCSA.2008.4493606

J. Rosenberg, H. Schulzrinne, G. Camarillo, A. Johnston, J. Peterson et al., SIP: Session Initiation Protocol, 2002.
DOI : 10.17487/rfc3261

G. Zhang, S. Fischer-hübner, and S. Ehlert, Blocking attacks on SIP VoIP proxies caused by external processing, Telecommunication Systems, vol.51, issue.10, 2009.
DOI : 10.1007/s11235-009-9234-1

G. Zhang, S. Fischer-hübner, L. A. Martucci, and S. Ehlert, Revealing the Calling History of SIP VoIP Systems by Timing Attacks, 2009 International Conference on Availability, Reliability and Security, pp.135-142, 2009.
DOI : 10.1109/ARES.2009.129