1 |
JaHyun Koo, "VoIP Service Security Vulnerability Analysis", Journal of Korea Institute of Information Security & Cryptology, Vol.16, No.1, pp.60-63, 2006.
|
2 |
Sessiong Border Controller, http://www.opensipstack. org
|
3 |
M. Baugher, D. McGrew, M. Naslund, E. Carrara and K.Norrman, "The secure real-time transport protocol (SRTP)," RFC 3711, March 2004.
|
4 |
P. Zimmermann, A. Johnston, and J. Callas, "ZRTP: Media Path Key Agreement for Secure RTP," Internet-Draft, March 2009.
|
5 |
J. Rosenberg, H. Schulzrinne, G. Camarillo, A. Johnston, J. Peterson, R. Sparks, M. Handley, E. Schooler, "SIP : Session Initiation Protocol", RFC 3261, June 2002.
|
6 |
C. Huitema, "Real Time Control Protocol (RTCP)attribute in Session Description Protocol (SDP)",RFC 3605, Oct 2003.
|
7 |
H. Schulzrinne, S. Casner, R. Frederick, and V. Jacobson, "RTP: A transport protocol for real-time applications," RFC 3550, July 2003.
|
8 |
K. Egevang, P. Francis ,"Network Address Translator (NAT)", RFC 1631, May 1994
|
9 |
Eunsung Park, Dongsu Seong, Keonbae Lee, "Refinement of RTP Processing Unit in SBC for VoIP Media Encryption between Private Networks", Journal of Korean Institute of Information Technology, Vol.9, No.8, pp.185-191, Aug 2011.
|
10 |
Wireshark, http://www.wireshark.org
|
11 |
JaeHong Min, PyungDong Jo, "VoIP Technology Trends", Weekly Trends of Tech. No.1021, http://www.itfind.or.kr
|