Interceptability of telecommunications: Is US and Dutch law prepared for the future?
暂无分享,去创建一个
[1] Christian Huitema,et al. IPv6--the new Internet protocol , 1996 .
[2] Sidnie Feit. TCP/IP: Architecture, Protocols, and Implementation with IPv6 and IP Security , 1997 .
[3] B. Koops. The Crypto Controversy: A Key Conflict in the Information Society , 1998 .
[4] Lillian R. BeVier. The Communications Assistance for Law Enforcement Act of 1994: A Surprising Sequel to the Break Up of AT&T , 1999 .
[5] Jonathan Davidson,et al. Voice over IP Fundamentals , 2000 .
[6] G. Sutter. A tale of two interception regimes : RIP v CALEA, a comparison , 2000 .
[7] Andy Oram,et al. Peer-to-Peer: Harnessing the Power of Disruptive Technologies , 2001 .
[8] James F. Durkin. Voice-Enabling the Data Network: H.323, MGCP, SIP, Q.S, SLAs, and Security , 2002 .
[9] Dinesh C. Verma. Legitimate Applications of Peer-to-Peer Networks , 2004 .
[10] A. Beijer,et al. De Wet bijzondere opsporingsbevoegdheden : Eindevaluatie , 2004 .
[11] Hui Min Chong,et al. Comparative analysis of traditional telephone and voice-over-Internet protocol (VoIP) systems , 2004, IEEE International Symposium on Electronics and the Environment, 2004. Conference Record. 2004.
[12] R.N.A. Bekkers,et al. Aftapbaarheid van telecommunicatie. Een evaluatie van hoofdstuk 13 Telecommunicatiewet , 2005 .
[13] Joshua E. Adrian. VoIP TAP: WHETHER THE FCC SHOULD APPLY WIRET APPING STANDARDS TO VOICE OVER INTERNET PROTOCOL , 2005 .
[14] D. Lenton. Multimedia on the move , 2005 .
[15] Rna Rudi Bekkers. On the increasing importance of technical interoperability and ETSI's role in it , 2005 .
[16] A. Smits. Strafvorderlijk onderzoek van telecommunicatie , 2006 .
[17] E. Brickell,et al. Security Implications of Applying the Communications Assistance to Law Enforcement Act to Voice over IP , 2006 .
[18] James C. Duff. ADMINISTRATIVE OFFICE OF THE UNITED STATES COURTS , 2007 .