相似文献/References:
[1]王南 孙保锁 王月平.P2PSIP系统中NAT穿越方案的研究与设计[J].计算机技术与发展,2009,(10):66.
WANG Nan,SUN Bao-suo,WANG Yue-ping.Research and Design of NAT Traversal Scheme in P2PSIP System[J].,2009,(01):66.
[2]李秀花 夏建生 王世波 李广磊 李娟.基于SIP协议的CSTA呼叫模型的实现探讨[J].计算机技术与发展,2008,(07):222.
LI Xiu-hua,XIA J ian-sheng,WANG Shi-bo,et al.Discussion on Using SIP Protocol to Realize CSTA Call Model[J].,2008,(01):222.
[3]蔡则高 管有庆.基于JXTA的P2PSIP系统研究与实现[J].计算机技术与发展,2011,(07):175.
CAI Ze-gao,GUAN You-qing.Research and Implementation of P2PSIP System Based on JXTA[J].,2011,(01):175.
[4]李杨,熊淑华,李梦涵,等.基于SIP协议的实时通信系统研究与实现[J].计算机技术与发展,2014,24(04):53.
LI Yang,XIONG Shu-hua,LI Meng-han,et al.Research and Realization of Real-time Communication System Based on SIP[J].,2014,24(01):53.
[5]蒋华[] [],潘文吉[],胡荣磊[]. 基于环签名的SIP认证方案设计[J].计算机技术与发展,2016,26(03):140.
JIANG Hua[][],PAN Wen-ji[],HU Rong-lei[]. Design of SIP Authentication Scheme Based on Ring Signature[J].,2016,26(01):140.