1 |
W. Wang, S.-C. Liew, and V.O.K. Li, "Solutions to Performance Problems in VoIP over a 802.11 Wireless LAN," IEEE Trans. Vehicular Technology, vol. 54, no. 1, 2005, pp. 366-384.
DOI
ScienceOn
|
2 |
doi: 10.1109/ACCT.2012.64
DOI
|
3 |
doi: 10.1109/LCN.2007.103
DOI
|
4 |
Kent, S.; Atkinson, R.. IP Encapsulating Security Payload (ESP). IETF. RFC 2406, November 1998.
|
5 |
Juhyuk Kim; Myungmook Han. "A Study of the NATted Host Identification Algorithm Using Pattern Analysis from Extended IP Header Information". Proceedings of KIIS spring Conference 2011 Vol.21. No.1. pp. 42-43. Apr. 2011
|
6 |
TaeSeok Jin, "Protocol and Algorithm Trend for IPSec Technology", 2011 spring conference proceedings of 'Korean Institue of Intelligent Systems' Vol.21, No.1, pp.221-224, Apr. 2011
|
7 |
Myunghee Kang; Hwangbin Ryou; Future System, Inc; Kwangwoon University. "An User Authorization Mechanism using an Attribute Certificate in the IPSec-VPN System". Institute of Information Security Vol.14. No.5. pp.11-21. Oct. 2004
|
8 |
Junghym kim; Youjip Won; Eulgyu Im, "A security problem and its solurion in IPSec", 2006 summer conference of The Institute of Electronics Engineers of Korea Vol. 29, No. 1, pp.57-58, 2006
|
9 |
Youngji Lee; Taiyun kim, "The problem resolution algorithm in ESP protoco", The KIPS transactions. Part C Part C c9(2), pp. 189-196, 2002
|
10 |
A. Nascimento et al., "Can I Add a Secure VoIP Call?" Proc. 13th IEEE Int'l Conf. Networks, vol. 1, 2005, pp. 151-155.
|
11 |
R. Rajavelsamy et al., "Performance Evaluation of VoIP over 3G-WLAN Interworking System," Proc. IEEE WCNC, vol. 4, 2005, pp. 2312-2317.
|
12 |
D.P. Hole and F.A. Tobagi, "Capacity of an IEEE 802.11b Wireless LAN Supporting VoIP," Proc. IEEE Int'l Conf. Comm., vol. 1, 2004, pp. 196-201.
|