![](/images/ico/ico_close.png)
![](/images/ico/ico5.png)
Publisher: OECD Publishing
ISSN: 1608-0270
Source: SourceOECD Science & Information Technology, Vol.2008, Iss.5, 2009-01, pp. : 107-150
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Abstract
Related content
![](/images/ico/ico_close.png)
![](/images/ico/ico5.png)
![](/images/ico/ico_close.png)
![](/images/ico/ico5.png)
![](/images/ico/ico_close.png)
![](/images/ico/ico5.png)
Designing attacks on SIP call set-up
International Journal of Applied Cryptography, Vol. 2, Iss. 1, 2010-07 ,pp. :
![](/images/ico/ico_close.png)
![](/images/ico/ico5.png)