{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:31:52Z","timestamp":1750307512075,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":29,"publisher":"ACM","license":[{"start":{"date-parts":[[2009,7,7]],"date-time":"2009-07-07T00:00:00Z","timestamp":1246924800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2009,7,7]]},"DOI":"10.1145\/1595637.1595639","type":"proceedings-article","created":{"date-parts":[[2009,9,25]],"date-time":"2009-09-25T19:37:23Z","timestamp":1253907443000},"page":"1-11","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":9,"title":["Improving authentication performance of distributed SIP proxies"],"prefix":"10.1145","author":[{"given":"Italo","family":"Dacosta","sequence":"first","affiliation":[{"name":"Georgia Tech Information Security Center (GTISC), Atlanta, GA"}]},{"given":"Vijay","family":"Balasubramaniyan","sequence":"additional","affiliation":[{"name":"Georgia Tech Information Security Center (GTISC), Atlanta, GA"}]},{"given":"Mustaque","family":"Ahamad","sequence":"additional","affiliation":[{"name":"Georgia Tech Information Security Center (GTISC), Atlanta, GA"}]},{"given":"Patrick","family":"Traynor","sequence":"additional","affiliation":[{"name":"Georgia Tech Information Security Center (GTISC), Atlanta, GA"}]}],"member":"320","published-online":{"date-parts":[[2009,7,7]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Introduction to linux traffic control. http:\/\/linux-ip.net\/articles\/traffic-control-howto\/intro.html.  Introduction to linux traffic control. http:\/\/linux-ip.net\/articles\/traffic-control-howto\/intro.html."},{"key":"e_1_3_2_1_2_1","unstructured":"Mysql ab - the world's most popular open source database. http:\/\/www.mysql.com\/.  Mysql ab - the world's most popular open source database. http:\/\/www.mysql.com\/."},{"key":"e_1_3_2_1_3_1","unstructured":"SIPp: traffic generator for the SIP protocol. http:\/\/sipp.sourceforge.net\/.  SIPp: traffic generator for the SIP protocol. http:\/\/sipp.sourceforge.net\/."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"crossref","unstructured":"A. Adya W. Bolosky M. Castro R. Chaiken G. Cermak J. Douceur J. Howell J. Lorch M. Theimer and R. Wattenhofer. Farsite: Federated available and reliable storage for an incompletely trusted environment 2002.  A. Adya W. Bolosky M. Castro R. Chaiken G. Cermak J. Douceur J. Howell J. Lorch M. Theimer and R. Wattenhofer. Farsite: Federated available and reliable storage for an incompletely trusted environment 2002.","DOI":"10.1145\/1060289.1060291"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2008.42"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/11799313_17"},{"key":"e_1_3_2_1_7_1","series-title":"Lecture Notes in Computer Science","first-page":"28","volume-title":"RSA '2001","author":"Boneh D.","year":"2001"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1002\/bltj.20048"},{"key":"e_1_3_2_1_9_1","first-page":"1","volume-title":"Towards Stateless Core: Improving SIP Proxy Scalability. In Global Telecommunications Conference, 2006. GLOBECOM '06. IEEE","author":"Cortes M.","year":"2006"},{"volume-title":"Proc. 1st IP-Telephony Wksp","year":"2000","author":"Eyers T.","key":"e_1_3_2_1_10_1"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","unstructured":"J. Franks P. Hallam-Baker J. Hostetler S. Lawrence P. Leach A. Luotonen and L. Stewart. RFC 2617: HTTP authentication: Basic and digest access authentication 1999.   J. Franks P. Hallam-Baker J. Hostetler S. Lawrence P. Leach A. Luotonen and L. Stewart. RFC 2617: HTTP authentication: Basic and digest access authentication 1999.","DOI":"10.17487\/rfc2617"},{"key":"e_1_3_2_1_12_1","unstructured":"L. Guernsey. Keeping the Lifelines Open. The New York Times http:\/\/www.nytimes.com\/2001\/09\/20\/technology\/circuits\/20INFR.html September 2001.  L. Guernsey. Keeping the Lifelines Open. The New York Times http:\/\/www.nytimes.com\/2001\/09\/20\/technology\/circuits\/20INFR.html September 2001."},{"volume-title":"Czech Technical University","year":"2003","author":"Janak J.","key":"e_1_3_2_1_13_1"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/11832072_17"},{"key":"e_1_3_2_1_15_1","unstructured":"R. Lemos. Cyber attacks disrupt Kyrgyzstan's networks. securityfocus. http:\/\/www.securityfocus.com\/brief\/896 January 2009.  R. Lemos. Cyber attacks disrupt Kyrgyzstan's networks. securityfocus. http:\/\/www.securityfocus.com\/brief\/896 January 2009."},{"first-page":"457","volume-title":"CMG-CONFERENCE-","author":"Liu H.","key":"e_1_3_2_1_16_1"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"crossref","unstructured":"E. M. Nahum J. Tracey and C. P. Wright. Evaluating SIP server performance 2007.  E. M. Nahum J. Tracey and C. P. Wright. Evaluating SIP server performance 2007.","DOI":"10.1145\/1254882.1254924"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-89054-6_7"},{"key":"e_1_3_2_1_19_1","unstructured":"OpenSER. OpenSER - the Open Source SIP Server. http:\/\/www.openser.org\/.  OpenSER. OpenSER - the Open Source SIP Server. http:\/\/www.openser.org\/."},{"key":"e_1_3_2_1_20_1","unstructured":"M. Richtel. Inauguration Crowd Will Test Cellphone Networks. The New York Times http:\/\/www.nytimes.com\/2009\/01\/19\/technology\/19cell.html 2009.  M. Richtel. Inauguration Crowd Will Test Cellphone Networks. The New York Times http:\/\/www.nytimes.com\/2009\/01\/19\/technology\/19cell.html 2009."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"crossref","unstructured":"J. Rosenberg H. Schulzrinne G. Camarillo A. Johnston J. Peterson R. Sparks M. Handley and E. Schooler. RFC 3261: SIP: Session Initiation Protocol 2002.   J. Rosenberg H. Schulzrinne G. Camarillo A. Johnston J. Peterson R. Sparks M. Handley and E. Schooler. RFC 3261: SIP: Session Initiation Protocol 2002.","DOI":"10.17487\/rfc3261"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2002.1081764"},{"key":"e_1_3_2_1_23_1","unstructured":"H. Schulzrinne S. Narayanan J. Lennox and M. Doyle. SIPstone-Benchmarking SIP Server Performance. 2002.  H. Schulzrinne S. Narayanan J. Lennox and M. Doyle. SIPstone-Benchmarking SIP Server Performance. 2002."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-89054-6_8"},{"volume-title":"International Symposium on Performance Evaluation of Computer and Telecommunication Systems (SPECTS)","year":"2005","author":"Singh K.","key":"e_1_3_2_1_25_1"},{"key":"e_1_3_2_1_26_1","unstructured":"K. Singh H. Schulzrinne and J. Lennox. SIP Server Scalability 2005.  K. Singh H. Schulzrinne and J. Lennox. SIP Server Scalability 2005."},{"key":"e_1_3_2_1_27_1","unstructured":"K. N. Singh. Reliable Scalable and Interoperable Internet Telephony. PhD thesis COLUMBIA UNIVERSITY 2006.   K. N. Singh. Reliable Scalable and Interoperable Internet Telephony . PhD thesis COLUMBIA UNIVERSITY 2006."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.5555\/1268299.1268300"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1007\/11426639_2"}],"event":{"name":"IPTComm '09: Principles, Systems and Applications of IP Telecommunications","sponsor":["ACM Association for Computing Machinery","SIGCOMM ACM Special Interest Group on Data Communication"],"location":"Atlanta Georgia","acronym":"IPTComm '09"},"container-title":["Proceedings of the 3rd International Conference on Principles, Systems and Applications of IP Telecommunications"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1595637.1595639","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1595637.1595639","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T12:18:03Z","timestamp":1750249083000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1595637.1595639"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,7,7]]},"references-count":29,"alternative-id":["10.1145\/1595637.1595639","10.1145\/1595637"],"URL":"https:\/\/doi.org\/10.1145\/1595637.1595639","relation":{},"subject":[],"published":{"date-parts":[[2009,7,7]]},"assertion":[{"value":"2009-07-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}