{"id":"https://openalex.org/W2028048906","doi":"https://doi.org/10.1515/piko.2007.206","title":"CoSIP \u2013 a hybrid architecture for reliable and secure SIP services","display_name":"CoSIP \u2013 a hybrid architecture for reliable and secure SIP services","publication_year":2007,"publication_date":"2007-01-01","ids":{"openalex":"https://openalex.org/W2028048906","doi":"https://doi.org/10.1515/piko.2007.206","mag":"2028048906"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1515/piko.2007.206","pdf_url":null,"source":{"id":"https://openalex.org/S4210217175","display_name":"PIK - Praxis der Informationsverarbeitung und Kommunikation","issn_l":"0930-5157","issn":["0930-5157","1865-8342"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310313990","host_organization_name":"De Gruyter","host_organization_lineage":["https://openalex.org/P4310313990"],"host_organization_lineage_names":["De Gruyter"],"type":"journal"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"journal-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5021965177","display_name":"Ali Fessi","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"A. Fessi","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5027667679","display_name":"Heiko Niedermayer","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"H. Niedermayer","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5015625859","display_name":"Holger Kinkelin","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"H. Kinkelin","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5060144977","display_name":"Georg Carle","orcid":"https://orcid.org/0000-0002-2347-1839"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"G. Carle","raw_affiliation_strings":[],"affiliations":[]}],"institution_assertions":[],"countries_distinct_count":0,"institutions_distinct_count":0,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"fulltext_origin":"ngrams","cited_by_count":0,"citation_normalized_percentile":{"value":0.0,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":0,"max":63},"biblio":{"volume":"30","issue":"4","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10742","display_name":"Peer-to-Peer Network Technologies","score":0.9977,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10742","display_name":"Peer-to-Peer Network Technologies","score":0.9977,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9955,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10651","display_name":"IPv6, Mobility, Handover, Networks, Security","score":0.9955,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/sip-trunking","display_name":"SIP trunking","score":0.538441},{"id":"https://openalex.org/keywords/distributed-hash-table","display_name":"Distributed hash table","score":0.48602325},{"id":"https://openalex.org/keywords/proxy-server","display_name":"Proxy server","score":0.46648836},{"id":"https://openalex.org/keywords/planetlab","display_name":"PlanetLab","score":0.41358912}],"concepts":[{"id":"https://openalex.org/C41878487","wikidata":"https://www.wikidata.org/wiki/Q191018","display_name":"Session Initiation Protocol","level":3,"score":0.8380139},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.81647027},{"id":"https://openalex.org/C171246234","wikidata":"https://www.wikidata.org/wiki/Q81945","display_name":"Voice over IP","level":3,"score":0.8065388},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.72285914},{"id":"https://openalex.org/C174255183","wikidata":"https://www.wikidata.org/wiki/Q3943657","display_name":"SIP trunking","level":4,"score":0.538441},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.50801134},{"id":"https://openalex.org/C2780224649","wikidata":"https://www.wikidata.org/wiki/Q863506","display_name":"Distributed hash table","level":3,"score":0.48602325},{"id":"https://openalex.org/C2779298391","wikidata":"https://www.wikidata.org/wiki/Q11189","display_name":"Proxy server","level":2,"score":0.46648836},{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.45198715},{"id":"https://openalex.org/C534932454","wikidata":"https://www.wikidata.org/wiki/Q161410","display_name":"Peer-to-peer","level":2,"score":0.44061053},{"id":"https://openalex.org/C2780300890","wikidata":"https://www.wikidata.org/wiki/Q851973","display_name":"PlanetLab","level":3,"score":0.41358912},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.36117572},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.23735905},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.19900274}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1515/piko.2007.206","pdf_url":null,"source":{"id":"https://openalex.org/S4210217175","display_name":"PIK - Praxis der Informationsverarbeitung und Kommunikation","issn_l":"0930-5157","issn":["0930-5157","1865-8342"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310313990","host_organization_name":"De Gruyter","host_organization_lineage":["https://openalex.org/P4310313990"],"host_organization_lineage_names":["De Gruyter"],"type":"journal"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/9","score":0.44,"display_name":"Industry, innovation and infrastructure"}],"grants":[],"datasets":[],"versions":[],"referenced_works_count":1,"referenced_works":["https://openalex.org/W2148082093"],"related_works":["https://openalex.org/W2387753015","https://openalex.org/W2386279120","https://openalex.org/W2259157838","https://openalex.org/W2222901101","https://openalex.org/W2149475203","https://openalex.org/W2130734501","https://openalex.org/W2119245670","https://openalex.org/W2117824579","https://openalex.org/W2075428787","https://openalex.org/W2073134299"],"abstract_inverted_index":{"Currently":[0],"the":[1,25,100,103,114,129,135,186,193],"most":[2],"prominent":[3],"service":[4,119,126],"on":[5,72,197],"SIP":[6,56,86,173,181],"basis":[7],"is":[8,67],"Voice":[9],"over":[10,39],"IP":[11,40],"(VoIP).":[12],"Despite":[13],"its":[14],"growing":[15],"popularity,":[16],"it":[17],"has":[18],"not":[19,47],"yet":[20,48],"been":[21,49],"able":[22],"to":[23,151,158],"substitute":[24],"\u201cgood":[26],"old\u201d":[27],"Public":[28],"Switched":[29],"Telephone":[30],"Network":[31],"(PSTN).":[32],"Security,":[33],"reliability,":[34,160],"emergency":[35],"calls":[36],"and":[37,64,102,108,121,138,162,175],"SPAM":[38],"Telephony":[41],"(SPIT)":[42],"are":[43],"issues":[44],"that":[45,90],"have":[46],"solved":[50],"satisfactorily.":[51],"In":[52],"our":[53],"approach,":[54],"Cooperative":[55],"(CoSIP),":[57],"we":[58],"address":[59],"two":[60],"important":[61],"issues:":[62],"reliability":[63,120],"security.":[65],"CoSIP":[66,168,188,196],"a":[68,73,94,139,171],"hybrid":[69],"architecture":[70,137],"based":[71],"Peer-to-Peer":[74],"(P2P)":[75],"network":[76,83,116],"cooperating":[77],"with":[78,179],"central":[79],"servers.":[80],"The":[81,183],"P2P":[82,115],"consists":[84],"of":[85,125,167,195],"User":[87],"Agents":[88],"(UA)":[89],"organize":[91],"themselves":[92],"in":[93,111,149],"Distributed":[95],"Hash":[96],"Table":[97],"(DHT).":[98],"Both":[99],"DHT":[101],"server":[104,130],"manage":[105],"user":[106],"registrations":[107],"session":[109],"establishments":[110],"parallel.":[112],"While":[113],"provides":[117,131],"better":[118,140],"robustness":[122],"against":[123],"denial":[124],"(DoS)":[127],"attacks,":[128],"improved":[132,159],"security":[133,161],"for":[134],"overall":[136],"lookup":[141],"performance.":[142,163],"Our":[143,164],"new":[144],"architcture":[145],"uses":[146],"both":[147,155],"technologies":[148],"parallel":[150],"combine":[152],"advantages":[153],"from":[154],"concepts,":[156],"leading":[157],"prototype":[165],"implementation":[166],"acts":[169],"as":[170],"local":[172],"proxy":[174,184],"can":[176],"be":[177],"used":[178],"standard":[180],"clients.":[182],"implements":[185],"additional":[187],"functionalities.":[189],"We":[190],"successfully":[191],"validated":[192],"functionality":[194],"PlanetLab.":[198]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2028048906","counts_by_year":[],"updated_date":"2024-12-10T12:35:09.960358","created_date":"2016-06-24"}