The Secure Communication Interoperability Protocol (SCIP) over an HF Radio Channel, MILCOM 2006, 2006. ,
DOI : 10.1109/MILCOM.2006.302132
The Secure Communication Interoperability Protocol (SCIP) over a VHF/UHF radio channel, MILCOM 2008, 2008 IEEE Military Communications Conference, 2008. ,
DOI : 10.1109/MILCOM.2008.4753183
Secure Voice over IP Simple Protocol) une solution pour la sécurisation de la voix sur IP, thèse présentée en décembre 2005 à l'ENST, 2010. ,
Simon Bransfield-Garth (Cellcrypt) : « La sécurité des communications téléphoniques s'affaiblit »simon-bransfield- garth-(cellcrypt)-la-securite-des-communications-telephoniques-saffaiblit, 2009. ,
SaaS s'invite aussi sur le terrain de la téléphonie », Veille & Actualité Informatique -Electronique ? Télécoms, Technique de l'ingénieur, novembre, 2009. ,
« La sécurité des téléphones sans fil Dect remise en question securite-des-telephones-sans-fil-dect-remise-en-question, 2009. ,
« Recherche et développement en sécurité des systèmes d'information : orientations et enjeux », 2008. ,
Research on Man-in-the-Middle Denial of Service Attack in SIP VoIP, 2009 International Conference on Networks Security, Wireless Communications and Trusted Computing, pp.263-266, 2009. ,
DOI : 10.1109/NSWCTC.2009.326
CommView disponible sur le site : http://www.tamos.com/products ,
Performance of FNBDT and low rate voice (MELP) over packet networks, Conference Record of Thirty-Fifth Asilomar Conference on Signals, Systems and Computers (Cat.No.01CH37256), pp.1568-1572, 2001. ,
DOI : 10.1109/ACSSC.2001.987750
Simulation of FNBDT over Internet and 3G wireless networks, The 2002 45th Midwest Symposium on Circuits and Systems, 2002. MWSCAS-2002., pp.330-333, 2002. ,
DOI : 10.1109/MWSCAS.2002.1186865
« Critical VPN Security Analysis and New Approach for Securing VoIP Communications over VPN Networks, proceedings of the Third ACM International Workshop on Wireless Multimedia Networking and Performance Modeling (WMuNeP'07), pp.22-26, 2007. ,
On the security of public key protocols, 22nd Annual Symposium on Foundations of Computer Science (sfcs 1981), pp.2-198, 1983. ,
DOI : 10.1109/SFCS.1981.32
VoIP) : une opportunité pour la sécurité ? », Proceeding of SSTIC symposium, 2007. ,
An approach of the Future Narrow Band Digital Terminal protocol, proceeding of Seventh International Conference on Computer Science and Information Technologies, pp.457-462, 2009. ,
A State-of-the-art Review, the Proceedings of the Fifth International Network Conference, pp.147-155, 2005. ,
Lambrinoudakis, « A lightweight protection mechanism against signaling attacks in a SIP-based VoIP environment », Telecommunication System revue, pp.153-159, 2007. ,
Security Analysis of Voice-over-IP Protocols, 20th IEEE Computer Security Foundations Symposium (CSF'07), pp.49-63, 2007. ,
DOI : 10.1109/CSF.2007.31
Formal Modeling of Authentication in SIP Registration, 2008 Second International Conference on Emerging Security Information, Systems and Technologies, pp.16-21, 2008. ,
DOI : 10.1109/SECURWARE.2008.61
Using the mobile phone as a security token for unified authentication, 2007 Second International Conference on Systems and Networks Communications (ICSNC 2007), 2007. ,
DOI : 10.1109/ICSNC.2007.82
Modadugu, « Session Initiation Protocol (SIP) over Datagram Transport Layer Security (DTLS) », IETF Internet Draft, draft- jennings-sip-dtls-05, 2007. ,
« La sécurité des systèmes d'information : un enjeu majeur pour la France », La documentation française, 2006. ,
Password authentication with insecure communication, Communications of the ACM, vol.24, issue.11, pp.770-772, 1981. ,
DOI : 10.1145/358790.358797
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.64.3756
New VoIP Traffic Security Scheme with Digital Watermarking, pp.170-181, 2006. ,
DOI : 10.1007/11875567_13
New security and control protocol for VoIP based on steganography and digital watermarking, Cryptography and Security Annales UMCS, Informatica, 2006. ,
Channels in SIP for VoIP Signalling, proceedings of the Global E-Security 4th International Conference, pp.23-25, 2008. ,
« Monitorage et Détection d'Intrusion dans les Réseaux Voix sur IP », thèse soutenue le 31 mars, 2009. ,
Flexible Single Sign-On for SIP: Bridging the Identity Chasm, 2009 IEEE International Conference on Communications, 2009. ,
DOI : 10.1109/ICC.2009.5199034
« Voice over IP Security », Ciscopress.com, édition septembre, 2008. ,
« The MD5 Message-Digest Algorithm », RFC 1321, 1992. ,
Keyed-Hashing for Message Authentication, 1997. ,
DOI : 10.17487/rfc2104
UTF-8, a transformation format of ISO 10646, RFC 2279, 1998. ,
Cryptographic Message Syntax Version 1.5», RFC 2315, 1998. ,
HTTP Authentication: Basic and Digest Access Authentication, RFC, vol.2617, 1999. ,
DOI : 10.17487/rfc2617
An HMAC-Based One-Time Password Algorithm, 2005. ,
SIP Security Attacks and Solutions: A state-of-the-art review, 2006 2nd International Conference on Information & Communication Technologies, pp.3187-3191, 2006. ,
DOI : 10.1109/ICTTA.2006.1684926
Research on Security Mechanisms of SIP-Based VoIP System, 2009 Ninth International Conference on Hybrid Intelligent Systems, pp.408-410, 2009. ,
DOI : 10.1109/HIS.2009.196
histoire des codes secrets », Edition Le livre de poche, 1999. ,
Cost Tools for Secure and Highly Available VoIP Communication Services ». Rapport intitulé : « General Reliability and Security Framework for VoIP Infrastructures, Auteurs : T. Dagiuklas et al ,
MELP: the new Federal Standard at 2400 bps, 1997 IEEE International Conference on Acoustics, Speech, and Signal Processing, pp.1591-1594, 1997. ,
DOI : 10.1109/ICASSP.1997.596257
« Méthodes d'authentification », Techniques de l'ingénieur, Réf, 2009. ,
VoIP Security and Privacy Threat Taxonomy, 2005. ,
Media Path Key Agreement for Secure RTP », draft-zimmermann-avt-zrtp-17, 2010. ,
DOI : 10.17487/rfc6189
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.204.7038