SIP Security
Priority security requirements
Re-using existing technology
Enhanced digest
IP-reachability security
S/MIME
Shared secret
Automating future trust
Transport-layer security