References
- H. Schulzrinne, S. Casner, R. Frederick, and V. Jacobson, "RTP: A Transport Protocol for Real-Time Applications," IETF RFC 3550, July 2003.
- M. Baugher, D. McGrew, M. Naslund, E. Carrara, and K. Norrman," The Secure Real-time Transport Protocol (SRTP)," IETF RFC 3711, Mar. 2004.
- J. Rosenberg, H. Schulzrinne, G. Camarillo, A. Johnston, J. Peterson, R. Sparks, M. Handley, and E. Schooler," SIP: Session Initiation Protocol," IETF RFC 3261, June 2002.
- J. Arkko, E. Carrara, F. Lindholm, M. Naslund, and K. Norrman," MIKEY: Multimedia Internet KEYing," IETF RFC 3830, Aug. 2004
- D. Igniatic, L. Dondeti, F. Audet, and P. Lin, "MIKEY-RSA-R: An Additional Mode of Key Distribution in Multimedia Internet KEYing (MIKEY) ," IETF RFC 4738, Nov. 2006.
- M. Euchner, "HMAC-Authenticated Diffie- Hellman for Multimedia Internet KEYing (MIKEY) ," IETF RFC 4650, Sept. 2006.
- J. Fischl, H. Tschofenig, and E. Rescorla, "Framework for Establishing an SRTP Security Context using DTLS," IETF Internet-Draft, draft-ietf-sip-dtls-srtp-framework-07, Mar. 2009.
- D. McGrew and E. Rescorla, "Datagram Transport Layer Security (DTLS) Extension to Establish Keys for Secure Real-time Transport Protocol (SRIP)," IEIF Internet-Draft, draft-ietf-avt-dtls-srtp-07, Feb. 2009.
- P. Zimmermann, A. Johnston, and J. Callas, "ZRTP: Media Path Key Agreement for Secure RTP," IETF Internet-Draft, draft-zimmermann-avt-zrtp-15, Mar. 2009.
- O. Jung, M. Petraschek, T. Hoeher, and I. Gojmerac, "Using SIP Identity to prevent Man-in-the-Middle Attacks on ZRTP," In Proceedings of the IFIP Wireless Days Conference 2008, Dubai, UAE, Nov. 2008.
- J. Peterson and C. Jennings, "Enhancements for Authenticated Identity Management in the Session Initiation Protocol (SIP)," IETF RFC 4474, Aug. 2006.
- D. Wing, S. Fries, H. Tschofenig, F. Audet, "Requirements and Analysis of Media Security Management Protocols," IETF RFC 5479, Apr. 2009.
- P. Gupta and V. Shmatikov, "Security Analysis of Voice-over-IP Protocols," In Proceedings of the 20th IEEE Computer Security Foundations Symposium (CSF 2007), pp. 49-63, Venice, Italy, July 2007.
- W. Werapun, A. A. EI Kalam, B. Paillassa, and J. Fasson, "Solution Analysis for SIP Security Threats," In Proceedings of the International Conference on Multimedia Computing and Systems (ICMCS'09), pp. 174-180, Quarzazate, Morocco, Apr. 2009.
- C. Wieser, J. Roning, and A. Takanen, "Security analysis and experiments for Voice over IP RTP media streams." In Proceedings of the 8th International Symposium on System and Information Security (SSI'2006), Sao Jose dos Campos, Sao Paolo, Brazil, Nov. 2006.
- 박대우, 윤석현, "VoIP 서비스의 도청 공격과 보안에 관한 연구," 한국컴퓨터정보학회 논문지, 제 11권, 제 4호, 155-164쪽, 2006년 9월.
- 홍종준, "RTP를 위한 보안 제어 프로토콜 구현," 한국컴퓨터정보학회 논문지, 제 8권, 제 3호, 144-149쪽, 2003년 9월.