5Cao F, Jennings C. Providing response identity and authentication in IP telephony [ J ]. Availabhty, Rehabhty and Security, 2003,49 (4): 1 196-1 198. 被引量:1
6Chien L H. Security of two remote user authentication schemes using smart cards[J]. IEEE Trans on Consumer Electronics,2003,49(4) : 1 196-1 198. 被引量:1
7Peterson J, Jennings C. Enhancements for authenticated identity management in the session initiation protocol(SIP)[ EB/OL]. [ 2007-03- 21 ]. ftp://ftp, rfceditor. org/innotes/rfc4474. txt. 被引量:1
8Srinivasan R, Vaidehi V, Harish K. Authentication of signaling in VolP applications [ C ]. Washington DC: IEEE Computer Society, 2005 : 530-533. 被引量:1