• Publications
  • Influence
Transaction-based authentication and key agreement protocol for inter-domain VoIP
We present an authentication and key agreement protocol to secure Voice over IP call establishment between interconnection proxies of different domains. Expand
  • 3
  • PDF
Inter-domain and DoS-resistant call establishment protocol (IDDR-CEP): work in progress
VoIP security is a tricky issue in inter-domain open context where interconnection proxies are reachable from anywhere on the public Internet and may be the subject of DoS and SPIT attacks. Expand
  • 2
Message control is transmitted from a field of transmitter to a recipient domain
To check a message (MES) to be transmitted by a sender attached to a sender domain (EXP) from a terminal connected to a transmitter domain (EM) to at least one recipient linked to an addressee domain (DES) the emitter domain requires authentication of the sender of the message by the sender domain. Expand
Procédé de protection contre les messages indésirables dans un réseau de télécommunications
Lorsqu'un client expediteur rattache a un domaine expediteur et connecte a un serveur emetteur envoie un "message original" (MES) a destination d'au moins un client destinataire rattache a un domaineExpand
Method and secure communications devices in a telecommunications network
A secure communications method in a telecommunications network, said network comprising a group of servers S i (where i = 1,2, ..., p, and p is a positive integer), said servers Authorization. Expand
Procédé de résolution d'un numéro de téléphone
L'invention concerne un procede de resolution par un domaine IP, dit domaine origine (A), du numero de telephone public ou prive d'un dispositif-client, dit appele, appartenant a un domaine IP, ditExpand
Detection of an anomaly in the traffic service entities through a packet network
To detect anomalies in the traffic sent by an entity (EC; ES) to another entity, a device (DD) intercepts a packet traffic (QAP) issued by the entity and determines a context of the entity according to the intercepted packet. Expand
Procede de securisation d'un reseau de communication audiovisuelle
Dans un reseau de communication audiovisuelle, un premier point d'extremite echange des messages avec un element de controle, les messages (140, 187) transmettant des parametres enregistres ou aExpand
Analysis of Token and Ticket Based Mechanisms for Current VoIP Security Issues and Enhancement Proposal
We identify the threats and the applicable protection mechanisms depending on the underlying VoIP architecture. Expand