Security measures for VoIP application: a state of the art review
暂无分享,去创建一个
[1] Abu Shohel Ahmed,et al. Evaluation of popular VoIP services , 2009, 2009 2nd International Conference on Adaptive Science & Technology (ICAST).
[2] Henning Schulzrinne,et al. Issues and challenges in securing VoIP , 2009, Comput. Secur..
[3] Jill Slay,et al. Voice over IP forensics , 2008, e-Forensics '08.
[4] Francisco J. Hens,et al. Triple Play: Building the Converged Network for Ip, Voip and Iptv , 2008 .
[5] Huirong Fu,et al. Traffic analysis attacks on Skype VoIP calls , 2011, Comput. Commun..
[6] Hao Wang,et al. Skype VoIP service- architecture and comparison , 2005 .
[7] Simson L. Garfinkel. VoIP and Skype Security , 2005 .
[8] Sabrina Sicari,et al. Assessing the risk of intercepting VoIP calls , 2008, Comput. Networks.
[9] Alexander Raake,et al. Speech Quality of VoIP - Assessment and Prediction , 2006 .
[10] Thomas Porter,et al. How to Cheat at VoIP Security , 2007 .
[11] Patrick Park. Voice over IP Security , 2008 .
[12] Tobias Hoßfeld,et al. Analysis of Skype VoIP traffic in UMTS: End-to-end QoS and QoE measurements , 2008, Comput. Networks.
[13] Ian Rytina,et al. Framework Architecture for Signaling Transport , 1999, RFC.
[14] Theodore Wallingford. Switching to VoIP , 2005 .
[15] Thomas Porter. Threats to VoIP Communications Systems , 2006 .
[16] 纤纤. Google Talk , 2007 .