I CONCEPTS & SERVICES SIP in Peer-to-Peer Networks,H. Schmidt and F. J. Hauck SIP: Advanced Media Integration, M. Hurtado, A. Rios, A. Oller, J. Alcober, and S.
Sallent SIP and IPv6 - Migration Considerations, Complications, and Deployment Scenarios,M. Boucadair and Y. Noisette SIP Mobility Management,C.-M. Huang and C.-H. Lee SIP Event Notification and Presence Information,C. Liu and B.
Zhao Group Conference Management with SIP, T.C. Schmidt and M. Wählisch Home Networking System with SIP,Y. Nakamoto and N. Kuri Compliance and Interoperability Testing of SIP Devices,D. Bao, L. De Vito, S.
Rapuano, and L. Tomaciello II TECHNOLOGIES P2P SIP: Network Architecture and Resource Location Strategy,G. Chang, C. Zhu, and W. Ning SIP Mobility Technologies and the use of Persistent Identifiers to Improve Inter-Domain Mobility and Security,H. Jerez, J. Khoury, and C. Abdallah SIP and Vertical Handoffs in Heterogeneous Wireless Networks, J.
Zhang, F.R. Yu, X. Wang, H.C.B. Chan,and V.C.
M. Leung NAT Traversals,M. Baldi, F. Risso, and L. Torrero Multipoint Extensions for SIP, S. Ramadass and O. Abouabdalla Narrowcasting in SIP: Articulated Privacy Control,S. Alam, M.
Cohen, J. Villegas, and A. Ahmed Q-SIP/SDP for QoS-guaranteed End-to-End Real-time Multimedia Service Provisioning on Converged Heterogeneous Wired and Wireless Networks,Y.-T. Kim and Y.-C. Jung SIP Modeling and Simulation,Y. Ding, G.
Su, and H. Wang SIP-based Mobility Management and its Performance Evaluation,N. Banerjee and K. Basu III SECURITY SIP Security: Threats, Vulnerabilities and Countermeasures,D. Geneiatakis, G. Kambourakis and C. Lambrinoudakis SIP Vulnerabilities for SPIT, SPIT Identification Criteria, Anti-SPIT Mechanisms Evaluation Framework and Legal Issues, G.F.
Marias, L. Mitrou, M. Theoharidou, J. Soupionis, S. Ehlert, and D. Gritzalis Anonymity in SIP,L. Kazatzopoulos, K. Delakourides, and G.
F. Marias Secure Intelligent SIP Services,H. Abdallah SIP Security and Quality of Service Performance,J.I. Agbinya A Conceptual Architecture for SPIT Mitigation,Y. Rebahi, S. Dritsas, T. Golubenco, B.
Pannier, and J.F. Juell Towards a Fraud Detection Framework in VoIP Networks,Y. Rebahi, T. Magedanz, and D. Sisalem RONG>D. Bao, L. De Vito, S.
Rapuano, and L. Tomaciello II TECHNOLOGIES P2P SIP: Network Architecture and Resource Location Strategy,G. Chang, C. Zhu, and W. Ning SIP Mobility Technologies and the use of Persistent Identifiers to Improve Inter-Domain Mobility and Security,H. Jerez, J. Khoury, and C. Abdallah SIP and Vertical Handoffs in Heterogeneous Wireless Networks, J.
Zhang, F.R. Yu, X. Wang, H.C.B. Chan,and V.C.
M. Leung NAT Traversals,M. Baldi, F. Risso, and L. Torrero Multipoint Extensions for SIP, S. Ramadass and O. Abouabdalla Narrowcasting in SIP: Articulated Privacy Control,S. Alam, M.
Cohen, J. Villegas, and A. Ahmed Q-SIP/SDP for QoS-guaranteed End-to-End Real-time Multimedia Service Provisioning on Converged Heterogeneous Wired and Wireless Networks,Y.-T. Kim and Y.-C. Jung SIP Modeling and Simulation,Y. Ding, G.
Su, and H. Wang SIP-based Mobility Management and its Performance Evaluation,N. Banerjee and K. Basu III SECURITY SIP Security: Threats, Vulnerabilities and Countermeasures,D. Geneiatakis, G. Kambourakis and C. Lambrinoudakis SIP Vulnerabilities for SPIT, SPIT Identification Criteria, Anti-SPIT Mechanisms Evaluation Framework and Legal Issues, G.F.
Marias, L. Mitrou, M. Theoharidou, J. Soupionis, S. Ehlert, and D. Gritzalis Anonymity in SIP,L. Kazatzopoulos, K. Delakourides, and G.
F. Marias Secure Intelligent SIP Services,H. Abdallah SIP Security and Quality of Service Performance,J.I. Agbinya A Conceptual Architecture for SPIT Mitigation,Y. Rebahi, S. Dritsas, T. Golubenco, B.
Pannier, and J.F. Juell Towards a Fraud Detection Framework in VoIP Networks,Y. Rebahi, T. Magedanz, and D. Sisalem NG>Q-SIP/SDP for QoS-guaranteed End-to-End Real-time Multimedia Service Provisioning on Converged Heterogeneous Wired and Wireless Networks,Y.-T. Kim and Y.
-C. Jung SIP Modeling and Simulation,Y. Ding, G. Su, and H. Wang SIP-based Mobility Management and its Performance Evaluation,N. Banerjee and K. Basu III SECURITY SIP Security: Threats, Vulnerabilities and Countermeasures,D. Geneiatakis, G.
Kambourakis and C. Lambrinoudakis SIP Vulnerabilities for SPIT, SPIT Identification Criteria, Anti-SPIT Mechanisms Evaluation Framework and Legal Issues, G.F. Marias, L. Mitrou, M. Theoharidou, J. Soupionis, S. Ehlert, and D.
Gritzalis Anonymity in SIP,L. Kazatzopoulos, K. Delakourides, and G.F. Marias Secure Intelligent SIP Services,H. Abdallah SIP Security and Quality of Service Performance,J.I. Agbinya A Conceptual Architecture for SPIT Mitigation,Y.
Rebahi, S. Dritsas, T. Golubenco, B. Pannier, and J.F. Juell Towards a Fraud Detection Framework in VoIP Networks,Y. Rebahi, T. Magedanz, and D.
Sisalem amp;lt;/P> Secure Intelligent SIP Services,H. Abdallah SIP Security and Quality of Service Performance,J.I. Agbinya A Conceptual Architecture for SPIT Mitigation,Y. Rebahi, S. Dritsas, T. Golubenco, B. Pannier, and J.
F. Juell Towards a Fraud Detection Framework in VoIP Networks,Y. Rebahi, T. Magedanz, and D. Sisalem.