M. [. Alvermann, W. N. Kurdziel, and . Furman, The Secure Communication Interoperability Protocol (SCIP) over an HF Radio Channel, MILCOM 2006, 2006.
DOI : 10.1109/MILCOM.2006.302132

M. [. Alvermann and . Kurdziel, The Secure Communication Interoperability Protocol (SCIP) over a VHF/UHF radio channel, MILCOM 2008, 2008 IEEE Military Communications Conference, 2008.
DOI : 10.1109/MILCOM.2008.4753183

[. Avispa, Secure Voice over IP Simple Protocol) une solution pour la sécurisation de la voix sur IP, thèse présentée en décembre 2005 à l'ENST, 2010.

«. [. Bellec and . Mwc, Simon Bransfield-Garth (Cellcrypt) : « La sécurité des communications téléphoniques s'affaiblit »simon-bransfield- garth-(cellcrypt)-la-securite-des-communications-telephoniques-saffaiblit, 2009.

M. Benoist and . Le, SaaS s'invite aussi sur le terrain de la téléphonie », Veille & Actualité Informatique -Electronique ? Télécoms, Technique de l'ingénieur, novembre, 2009.

. [. Braux, « La sécurité des téléphones sans fil Dect remise en question securite-des-telephones-sans-fil-dect-remise-en-question, 2009.

. [. Chabaud, « Recherche et développement en sécurité des systèmes d'information : orientations et enjeux », 2008.

S. [. Chen, K. Guo, E. H. Zheng, and . Li, Research on Man-in-the-Middle Denial of Service Attack in SIP VoIP, 2009 International Conference on Networks Security, Wireless Communications and Trusted Computing, pp.263-266, 2009.
DOI : 10.1109/NSWCTC.2009.326

. Comm and . Logiciel, CommView disponible sur le site : http://www.tamos.com/products

K. [. Daniel and . Teague, Performance of FNBDT and low rate voice (MELP) over packet networks, Conference Record of Thirty-Fifth Asilomar Conference on Signals, Systems and Computers (Cat.No.01CH37256), pp.1568-1572, 2001.
DOI : 10.1109/ACSSC.2001.987750

]. E. Daniel and K. A. Teague, Simulation of FNBDT over Internet and 3G wireless networks, The 2002 45th Midwest Symposium on Circuits and Systems, 2002. MWSCAS-2002., pp.330-333, 2002.
DOI : 10.1109/MWSCAS.2002.1186865

S. [. Diab, C. Tohme, and . Bassil, « Critical VPN Security Analysis and New Approach for Securing VoIP Communications over VPN Networks, proceedings of the Third ACM International Workshop on Wireless Multimedia Networking and Performance Modeling (WMuNeP'07), pp.22-26, 2007.

A. [. Dolev and . Yao, On the security of public key protocols, 22nd Annual Symposium on Foundations of Computer Science (sfcs 1981), pp.2-198, 1983.
DOI : 10.1109/SFCS.1981.32

. [. Dubée and I. La-voix-sur, VoIP) : une opportunité pour la sécurité ? », Proceeding of SSTIC symposium, 2007.

. [. Gauche, An approach of the Future Narrow Band Digital Terminal protocol, proceeding of Seventh International Conference on Computer Science and Information Technologies, pp.457-462, 2009.

G. [. Geneiatakis, T. Kambourakis, C. Dagiuklas, S. Lambrinoudakis, «. Gritzalis et al., A State-of-the-art Review, the Proceedings of the Fifth International Network Conference, pp.147-155, 2005.

. [. Geneiatakis, Lambrinoudakis, « A lightweight protection mechanism against signaling attacks in a SIP-based VoIP environment », Telecommunication System revue, pp.153-159, 2007.

V. [. Gupta and . Shmatikov, Security Analysis of Voice-over-IP Protocols, 20th IEEE Computer Security Foundations Symposium (CSF'07), pp.49-63, 2007.
DOI : 10.1109/CSF.2007.31

L. [. Hagalisletto and . Strand, Formal Modeling of Authentication in SIP Registration, 2008 Second International Conference on Emerging Security Information, Systems and Technologies, pp.16-21, 2008.
DOI : 10.1109/SECURWARE.2008.61

I. [. Hallsteinsen, D. V. Jøstad, and . Thanh, Using the mobile phone as a security token for unified authentication, 2007 Second International Conference on Systems and Networks Communications (ICSNC 2007), 2007.
DOI : 10.1109/ICSNC.2007.82

N. [. Jennings, Modadugu, « Session Initiation Protocol (SIP) over Datagram Transport Layer Security (DTLS) », IETF Internet Draft, draft- jennings-sip-dtls-05, 2007.

. [. Lasbordes, « La sécurité des systèmes d'information : un enjeu majeur pour la France », La documentation française, 2006.

. [. Lamport, Password authentication with insecure communication, Communications of the ACM, vol.24, issue.11, pp.770-772, 1981.
DOI : 10.1145/358790.358797

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.64.3756

]. W. Mazurczyk1 and E. Z. Kotulski, New VoIP Traffic Security Scheme with Digital Watermarking, pp.170-181, 2006.
DOI : 10.1007/11875567_13

W. Mazurczyk1 and E. Z. Kotulski, New security and control protocol for VoIP based on steganography and digital watermarking, Cryptography and Security Annales UMCS, Informatica, 2006.

]. W. Mazurczyk1, E. K. Szczypiorski, and . Covert, Channels in SIP for VoIP Signalling, proceedings of the Global E-Security 4th International Conference, pp.23-25, 2008.

. [. Nassar, « Monitorage et Détection d'Intrusion dans les Réseaux Voix sur IP », thèse soutenue le 31 mars, 2009.

J. [. Nie, S. Tapio, J. Tarkoma, and . Heikkinen, Flexible Single Sign-On for SIP: Bridging the Identity Chasm, 2009 IEEE International Conference on Communications, 2009.
DOI : 10.1109/ICC.2009.5199034

. [. Park, « Voice over IP Security », Ciscopress.com, édition septembre, 2008.

. [. Rivest, « The MD5 Message-Digest Algorithm », RFC 1321, 1992.

M. [. Krawczyk, E. R. Bellare, «. Canetti, and . Hmac, Keyed-Hashing for Message Authentication, 1997.
DOI : 10.17487/rfc2104

. [. Yergeau, UTF-8, a transformation format of ISO 10646, RFC 2279, 1998.

«. [. Kaliski and . Pkcs-#7, Cryptographic Message Syntax Version 1.5», RFC 2315, 1998.

P. [. Franks, J. Hallam-baker, S. Hostetler, P. Lawrence, A. Leach et al., HTTP Authentication: Basic and Digest Access Authentication, RFC, vol.2617, 1999.
DOI : 10.17487/rfc2617

M. [. M-'raihi, F. Bellare, D. Hoornaert, O. Naccache, «. Ranen et al., An HMAC-Based One-Time Password Algorithm, 2005.

P. [. Sawda and . Urien, SIP Security Attacks and Solutions: A state-of-the-art review, 2006 2nd International Conference on Information & Communication Technologies, pp.3187-3191, 2006.
DOI : 10.1109/ICTTA.2006.1684926

E. [. Shan and . Jiang, Research on Security Mechanisms of SIP-Based VoIP System, 2009 Ninth International Conference on Hybrid Intelligent Systems, pp.408-410, 2009.
DOI : 10.1109/HIS.2009.196

«. [. Singh, histoire des codes secrets », Edition Le livre de poche, 1999.

. Sno, S. Projet, and . Low, Cost Tools for Secure and Highly Available VoIP Communication Services ». Rapport intitulé : « General Reliability and Security Framework for VoIP Infrastructures, Auteurs : T. Dagiuklas et al

R. [. Supplee, E. J. Cohn, «. Collura, and . Melp, MELP: the new Federal Standard at 2400 bps, 1997 IEEE International Conference on Acoustics, Speech, and Signal Processing, pp.1591-1594, 1997.
DOI : 10.1109/ICASSP.1997.596257

. [. Thoniel, « Méthodes d'authentification », Techniques de l'ingénieur, Réf, 2009.

. [. Zar, VoIP Security and Privacy Threat Taxonomy, 2005.

A. [. Zimmermann, E. J. Johnston, «. Callas, and . Zrtp, Media Path Key Agreement for Secure RTP », draft-zimmermann-avt-zrtp-17, 2010.
DOI : 10.17487/rfc6189

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.204.7038