{"id":"https://openalex.org/W2097812966","doi":"https://doi.org/10.1145/1595637.1595639","title":"Improving authentication performance of distributed SIP proxies","display_name":"Improving authentication performance of distributed SIP proxies","publication_year":2009,"publication_date":"2009-07-07","ids":{"openalex":"https://openalex.org/W2097812966","doi":"https://doi.org/10.1145/1595637.1595639","mag":"2097812966"},"language":"en","primary_location":{"id":"doi:10.1145/1595637.1595639","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1595637.1595639","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 3rd International Conference on Principles, Systems and Applications of IP Telecommunications","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5006676867","display_name":"Italo Dacosta","orcid":null},"institutions":[{"id":"https://openalex.org/I130701444","display_name":"Georgia Institute of Technology","ror":"https://ror.org/01zkghx44","country_code":"US","type":"education","lineage":["https://openalex.org/I130701444"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Italo Dacosta","raw_affiliation_strings":["Georgia Tech Information Security Center (GTISC), Atlanta, GA","Georgia Tech Information Security Center (GTISC), Atlanta, GA#TAB#"],"affiliations":[{"raw_affiliation_string":"Georgia Tech Information Security Center (GTISC), Atlanta, GA","institution_ids":["https://openalex.org/I130701444"]},{"raw_affiliation_string":"Georgia Tech Information Security Center (GTISC), Atlanta, GA#TAB#","institution_ids":["https://openalex.org/I130701444"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5073890487","display_name":"Vijay A. Balasubramaniyan","orcid":null},"institutions":[{"id":"https://openalex.org/I130701444","display_name":"Georgia Institute of Technology","ror":"https://ror.org/01zkghx44","country_code":"US","type":"education","lineage":["https://openalex.org/I130701444"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Vijay Balasubramaniyan","raw_affiliation_strings":["Georgia Tech Information Security Center (GTISC), Atlanta, GA","Georgia Tech Information Security Center (GTISC), Atlanta, GA#TAB#"],"affiliations":[{"raw_affiliation_string":"Georgia Tech Information Security Center (GTISC), Atlanta, GA","institution_ids":["https://openalex.org/I130701444"]},{"raw_affiliation_string":"Georgia Tech Information Security Center (GTISC), Atlanta, GA#TAB#","institution_ids":["https://openalex.org/I130701444"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5018826118","display_name":"Mustaque Ahamad","orcid":"https://orcid.org/0000-0002-7955-5126"},"institutions":[{"id":"https://openalex.org/I130701444","display_name":"Georgia Institute of Technology","ror":"https://ror.org/01zkghx44","country_code":"US","type":"education","lineage":["https://openalex.org/I130701444"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Mustaque Ahamad","raw_affiliation_strings":["Georgia Tech Information Security Center (GTISC), Atlanta, GA","Georgia Tech Information Security Center (GTISC), Atlanta, GA#TAB#"],"affiliations":[{"raw_affiliation_string":"Georgia Tech Information Security Center (GTISC), Atlanta, GA","institution_ids":["https://openalex.org/I130701444"]},{"raw_affiliation_string":"Georgia Tech Information Security Center (GTISC), Atlanta, GA#TAB#","institution_ids":["https://openalex.org/I130701444"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5048941759","display_name":"Patrick Traynor","orcid":"https://orcid.org/0000-0002-7143-5189"},"institutions":[{"id":"https://openalex.org/I130701444","display_name":"Georgia Institute of Technology","ror":"https://ror.org/01zkghx44","country_code":"US","type":"education","lineage":["https://openalex.org/I130701444"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Patrick Traynor","raw_affiliation_strings":["Georgia Tech Information Security Center (GTISC), Atlanta, GA","Georgia Tech Information Security Center (GTISC), Atlanta, GA#TAB#"],"affiliations":[{"raw_affiliation_string":"Georgia Tech Information Security Center (GTISC), Atlanta, GA","institution_ids":["https://openalex.org/I130701444"]},{"raw_affiliation_string":"Georgia Tech Information Security Center (GTISC), Atlanta, GA#TAB#","institution_ids":["https://openalex.org/I130701444"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5006676867"],"corresponding_institution_ids":["https://openalex.org/I130701444"],"apc_list":null,"apc_paid":null,"fwci":2.6917,"has_fulltext":false,"cited_by_count":13,"citation_normalized_percentile":{"value":0.90236697,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"11"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10651","display_name":"IPv6, Mobility, Handover, Networks, Security","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10651","display_name":"IPv6, Mobility, Handover, Networks, Security","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9976000189781189,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12326","display_name":"Network Packet Processing and Optimization","score":0.9958999752998352,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8371137380599976},{"id":"https://openalex.org/keywords/throughput","display_name":"Throughput","score":0.7346887588500977},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.6693175435066223},{"id":"https://openalex.org/keywords/bandwidth","display_name":"Bandwidth (computing)","score":0.5636725425720215},{"id":"https://openalex.org/keywords/proxy","display_name":"Proxy (statistics)","score":0.5635262131690979},{"id":"https://openalex.org/keywords/latency","display_name":"Latency (audio)","score":0.5383319854736328},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.5023088455200195},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.43857383728027344},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.35856732726097107},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.15770453214645386},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.14768177270889282},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.09991452097892761},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.09959718585014343}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8371137380599976},{"id":"https://openalex.org/C157764524","wikidata":"https://www.wikidata.org/wiki/Q1383412","display_name":"Throughput","level":3,"score":0.7346887588500977},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.6693175435066223},{"id":"https://openalex.org/C2776257435","wikidata":"https://www.wikidata.org/wiki/Q1576430","display_name":"Bandwidth (computing)","level":2,"score":0.5636725425720215},{"id":"https://openalex.org/C2780148112","wikidata":"https://www.wikidata.org/wiki/Q1432581","display_name":"Proxy (statistics)","level":2,"score":0.5635262131690979},{"id":"https://openalex.org/C82876162","wikidata":"https://www.wikidata.org/wiki/Q17096504","display_name":"Latency (audio)","level":2,"score":0.5383319854736328},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.5023088455200195},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.43857383728027344},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.35856732726097107},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.15770453214645386},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.14768177270889282},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.09991452097892761},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.09959718585014343},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/1595637.1595639","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1595637.1595639","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 3rd International Conference on Principles, Systems and Applications of IP Telecommunications","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":24,"referenced_works":["https://openalex.org/W179023190","https://openalex.org/W203964163","https://openalex.org/W1551056197","https://openalex.org/W1590514214","https://openalex.org/W1624938295","https://openalex.org/W1682108550","https://openalex.org/W1741536035","https://openalex.org/W1853871913","https://openalex.org/W1970705443","https://openalex.org/W2055057770","https://openalex.org/W2097978804","https://openalex.org/W2103239853","https://openalex.org/W2112578244","https://openalex.org/W2118484582","https://openalex.org/W2121133177","https://openalex.org/W2135652458","https://openalex.org/W2136050149","https://openalex.org/W2158670827","https://openalex.org/W2167341845","https://openalex.org/W2247098603","https://openalex.org/W2399310879","https://openalex.org/W2602645338","https://openalex.org/W4242138061","https://openalex.org/W4254263397"],"related_works":["https://openalex.org/W2028495302","https://openalex.org/W2136583354","https://openalex.org/W4396872084","https://openalex.org/W2111238207","https://openalex.org/W4249498729","https://openalex.org/W2002261065","https://openalex.org/W2078379271","https://openalex.org/W2043460294","https://openalex.org/W4210712718","https://openalex.org/W1905398909"],"abstract_inverted_index":{"The":[0],"performance":[1,44],"of":[2,11,17,56,80,84,96,102,140,185],"SIP":[3,88,191],"proxies":[4,35],"is":[5],"critical":[6],"for":[7,71,187],"the":[8,15,54,78,93,146,155,165,179,183],"robust":[9],"operation":[10],"many":[12],"applications.":[13,192],"However,":[14],"use":[16,79],"even":[18],"light-weight":[19],"authentication":[20,39,186],"schemes":[21],"can":[22,41,61,115],"significantly":[23,177],"degrade":[24],"throughput":[25,66,153,184],"in":[26,32],"these":[27],"systems.":[28],"In":[29,48],"particular,":[30],"systems":[31],"which":[33],"multiple":[34],"share":[36],"a":[37,81,86,99,136],"remote":[38],"database":[40],"experience":[42],"reduced":[43],"due":[45],"to":[46,64,129,149],"latency.":[47],"this":[49],"paper,":[50],"we":[51,90,124,144,176],"investigate":[52],"how":[53],"application":[55],"parallel":[57,103],"execution":[58],"and":[59,73,110,142,181],"batching":[60,141],"be":[62],"used":[63],"maximize":[65,150],"while":[67],"carefully":[68,137],"balancing":[69],"demands":[70],"bandwidth":[72,147],"call":[74,118,166],"failure":[75],"rates.":[76],"Through":[77,135,174],"modified":[82],"version":[83],"OpenSER,":[85],"high-performance":[87],"proxy,":[89],"demonstrate":[91],"that":[92,123],"traditional":[94],"recommendation":[95],"simply":[97],"launching":[98],"large":[100],"number":[101],"processes":[104],"not":[105],"only":[106],"incurs":[107],"substantial":[108],"overhead":[109],"increases":[111],"dropped":[112],"calls,":[113],"but":[114],"actually":[116],"decrease":[117],"throughput.":[119,134],"An":[120],"alternative":[121],"technique":[122],"implement,":[125],"request":[126],"batching,":[127],"fails":[128],"achieve":[130],"similarly":[131],"high":[132],"proxy":[133,156],"selected":[138],"mix":[139,162],"parallelization,":[143],"reduce":[145,178],"required":[148],"authenticated":[151],"signaling":[152],"by":[154,157],"more":[158],"than":[159],"75%.":[160],"This":[161],"also":[163],"keeps":[164],"loss":[167],"rates":[168],"below":[169],"1%":[170],"at":[171],"peak":[172],"performance.":[173],"this,":[175],"cost":[180],"increase":[182],"large-scale":[188],"networks":[189],"supporting":[190]},"counts_by_year":[{"year":2020,"cited_by_count":1},{"year":2018,"cited_by_count":2},{"year":2013,"cited_by_count":1},{"year":2012,"cited_by_count":4}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
