SIP Security

1/15/02


Click here to start


Table of Contents

SIP Security

Priority security requirements

Re-using existing technology

Enhanced digest

IP-reachability security

S/MIME

Shared secret

Automating future trust

Transport-layer security

Author: Henning Schulzrinne