7Hong Y, Hui Z, Sripanidkulchal K, et al. Information leak vulnerabilities in SIP implementations. IEEE Networks, 2006, 20 (5) :6-13
8Samer S, Pascal U. SIP Security Attacks and Solutions: A State of-the-Art Review//Proc. of IEEE International Conference on Information and Communication Technologies. 2006, 2 : 3187- 3191
9Schmidt H,Chi-Tai D, Hauck F J. Proxy-based Security for the Session Initiation Protocol (SIP)//Proc. of the Second International Conference on Systems and Networks Communications. 2007 : 24-28
10Stefano S, Luca V, Donald P, et al. SIP security issues: the SIP authentication procedure and its processing load. IEEE Network, 2002,16(6) : 38-44