Table of Contents
I CONCEPTS & SERVICES
SIP in Peer-to-Peer Networks, H. Schmidt and F. J. Hauck
SIP: Advanced Media Integration, M. Hurtado, A. Rios, A. Oller, J. Alcober, and S. Sallent
SIP and IPv6 – Migration Considerations, Complications, and Deployment Scenarios, M. Boucadair and Y. Noisette
SIP Mobility Management, C.-M. Huang and C.-H. Lee
SIP Event Notification and Presence Information, C. Liu and B. Zhao
Group Conference Management with SIP, T.C. Schmidt and M. Wählisch
Home Networking System with SIP, Y. Nakamoto and N. Kuri
Compliance and Interoperability Testing of SIP Devices, D. Bao, L. De Vito, S. Rapuano, and L. Tomaciello
II TECHNOLOGIES
P2P SIP: Network Architecture and Resource Location Strategy, G. Chang, C. Zhu, and W. Ning
SIP Mobility Technologies and the use of Persistent Identifiers to Improve Inter-Domain Mobility and Security, H. Jerez, J. Khoury, and C. Abdallah
SIP and Vertical Handoffs in Heterogeneous Wireless Networks, J. Zhang, F.R. Yu, X. Wang, H.C.B. Chan,and V.C.M. Leung
NAT Traversals, M. Baldi, F. Risso, and L. Torrero
Multipoint Extensions for SIP, S. Ramadass and O. Abouabdalla
Narrowcasting in SIP: Articulated Privacy Control, S. Alam, M. Cohen, J. Villegas, and A. Ahmed
Q-SIP/SDP for QoS-guaranteed End-to-End Real-time Multimedia Service Provisioning on Converged Heterogeneous Wired and Wireless Networks, Y.-T. Kim and Y.-C. Jung
SIP Modeling and Simulation, Y. Ding, G. Su, and H. Wang
SIP-based Mobility Management and its Performance Evaluation, N. Banerjee and K. Basu
III SECURITY
SIP Security: Threats, Vulnerabilities and Countermeasures, D. Geneiatakis, G. Kambourakis and C. Lambrinoudakis
SIP Vulnerabilities for SPIT, SPIT Identification Criteria, Anti-SPIT Mechanisms Evaluation Framework and Legal Issues, G.F. Marias, L. Mitrou, M. Theoharidou, J. Soupionis, S. Ehlert, and D. Gritzalis
Anonymity in SIP, L. Kazatzopoulos, K. Delakourides, and G.F. Marias
Secure Intelligent SIP Services, H. Abdallah
SIP Security and Quality of Service Performance, J.I. Agbinya
A Conceptual Architecture for SPIT Mitigation, Y. Rebahi, S. Dritsas, T. Golubenco, B. Pannier, and J.F. Juell
Towards a Fraud Detection Framework in VoIP Networks, Y. Rebahi, T. Magedanz, and D. Sisalem