| 6 | -- | 13 | Hong Yan, Hui Zhang, Kunwadee Sripanidkulchai, Zon-Yin Shae, Debanjan Saha. Information leak vulnerabilities in SIP implementations |
| 14 | -- | 17 | Hannes Tschofenig, Rainer Falk, Jon Peterson, Jeff Hodges, Douglas C. Sicker, James Polk. Using SAML to protect the session initiation protocol (SIP) |
| 18 | -- | 24 | Dongwook Shin, Jinyoung Ahn, Choon Shim. Progressive multi gray-leveling: a voice spam protection algorithm |
| 26 | -- | 31 | Dorgham Sisalem, Jiri Kuthan, Sven Ehlert. Denial of service attacks targeting a SIP VoIP infrastructure: attack scenarios and prevention mechanisms |
| 32 | -- | 37 | Shiping Chen, Xinyuan Wang, Sushil Jajodia. On the anonymity and traceability of peer-to-peer VoIP calls |
| 38 | -- | 45 | Jan Seedorf. Security challenges for peer-to-peer SIP |