Improving The Efficiency Of Sip Authentication Based On The Pre-Calculated Look-Up Table
IP phones have benefited greatly from the ever-increasing capabilities of computer hardware in general, including faster microprocessors, larger memory capacity, and greater network bandwidth. A single IP phone shipping in 2010 has far more computing capacity than most of the early PBXs. This tre...
Saved in:
Main Author: | |
---|---|
Format: | Thesis |
Language: | English |
Published: |
2013
|
Subjects: | |
Online Access: | http://eprints.usm.my/43244/1/Aws%20Naser%20Jaber24.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
my-usm-ep.43244 |
---|---|
record_format |
uketd_dc |
spelling |
my-usm-ep.432442019-04-12T05:26:16Z Improving The Efficiency Of Sip Authentication Based On The Pre-Calculated Look-Up Table 2013-05 Jaber, Aws Naser QA75.5-76.95 Electronic computers. Computer science IP phones have benefited greatly from the ever-increasing capabilities of computer hardware in general, including faster microprocessors, larger memory capacity, and greater network bandwidth. A single IP phone shipping in 2010 has far more computing capacity than most of the early PBXs. This trend will only continue. IP phones are adding color displays with full-blown Web browsers. Some are adding embedded Warning Do not forget to investigate how data is stored on a local system or any intermediary system. If, for instance, all log files of IM chat sessions are stored in clear, unencrypted text on a local computer where multiple people have access to the computer, the fact that the IM client encrypts sessions between the computers and the server does not fully protect those sessions. The session transcripts could still be read locally by anyone with access to the local computer. Today, while many companies might still choose to buy from a single vendor for the sake of convenience, the reality is that in the era of interoperable protocol standards like Session Initiation Protocol (SIP), the companies are no longer required to buy from the same vendor. The session initiation protocol (SIP) has recently become the main signaling protocol for Internet applications. The wide range of SIP services raises many concerns on SIP security. Thus, the most popular SIP authentication schemes were studied in this paper. The previous cryptographic scheme known as Yoon’s scheme proposes SIP authentication that brings efficiency in security but is costly in terms of time. 2013-05 Thesis http://eprints.usm.my/43244/ http://eprints.usm.my/43244/1/Aws%20Naser%20Jaber24.pdf application/pdf en public masters Universiti Sains Malaysia Pusat Pengajian Sains Komputer |
institution |
Universiti Sains Malaysia |
collection |
USM Institutional Repository |
language |
English |
topic |
QA75.5-76.95 Electronic computers Computer science |
spellingShingle |
QA75.5-76.95 Electronic computers Computer science Jaber, Aws Naser Improving The Efficiency Of Sip Authentication Based On The Pre-Calculated Look-Up Table |
description |
IP phones have benefited greatly from the ever-increasing capabilities of
computer hardware in general, including faster microprocessors, larger memory
capacity, and greater network bandwidth. A single IP phone shipping in 2010 has far
more computing capacity than most of the early PBXs. This trend will only continue.
IP phones are adding color displays with full-blown Web browsers. Some are adding
embedded Warning Do not forget to investigate how data is stored on a local system
or any intermediary system. If, for instance, all log files of IM chat sessions are
stored in clear, unencrypted text on a local computer where multiple people have
access to the computer, the fact that the IM client encrypts sessions between the
computers and the server does not fully protect those sessions. The session
transcripts could still be read locally by anyone with access to the local computer.
Today, while many companies might still choose to buy from a single vendor for the
sake of convenience, the reality is that in the era of interoperable protocol standards
like Session Initiation Protocol (SIP), the companies are no longer required to buy
from the same vendor. The session initiation protocol (SIP) has recently become the
main signaling protocol for Internet applications. The wide range of SIP services
raises many concerns on SIP security. Thus, the most popular SIP authentication
schemes were studied in this paper. The previous cryptographic scheme known as
Yoon’s scheme proposes SIP authentication that brings efficiency in security but is
costly in terms of time. |
format |
Thesis |
qualification_level |
Master's degree |
author |
Jaber, Aws Naser |
author_facet |
Jaber, Aws Naser |
author_sort |
Jaber, Aws Naser |
title |
Improving The Efficiency Of Sip
Authentication Based On The
Pre-Calculated Look-Up Table |
title_short |
Improving The Efficiency Of Sip
Authentication Based On The
Pre-Calculated Look-Up Table |
title_full |
Improving The Efficiency Of Sip
Authentication Based On The
Pre-Calculated Look-Up Table |
title_fullStr |
Improving The Efficiency Of Sip
Authentication Based On The
Pre-Calculated Look-Up Table |
title_full_unstemmed |
Improving The Efficiency Of Sip
Authentication Based On The
Pre-Calculated Look-Up Table |
title_sort |
improving the efficiency of sip
authentication based on the
pre-calculated look-up table |
granting_institution |
Universiti Sains Malaysia |
granting_department |
Pusat Pengajian Sains Komputer |
publishDate |
2013 |
url |
http://eprints.usm.my/43244/1/Aws%20Naser%20Jaber24.pdf |
_version_ |
1747821185869021184 |