1 |
Steven M. Bellovin, Susan Landau, Matt Bla, 'The real national-security needs for VoIP,' Communications of the ACM, Nov. 2005
|
2 |
M.Narbutt, A.Kelly, P. Perry, L.Murphy, 'Adaptive VoIP playout scheduling: assessing user satisfaction,' IEEE Internet Computing, July. 2005
|
3 |
Time Green and Phil Hochmuth, VoIP security a moving target, Network World, 2004. 10
|
4 |
J. Rosenberg, H. Schulzrinne, G. Camarillo, A. Johnston, J. Peterson, R. Sparks, M. Handley, E. Schooler, 'Session Initiation Protocol,' rfc3261, June. 2002
|
5 |
김석훈, 'VPN 기반의 음성 보안을 위한 인터넷 텔레포니 시스템', 한국해양정보통신학회 논문지, 제10권 5호, 2006. 5
과학기술학회마을
|
6 |
Yi Bing Lin, Whai En Chen, Chai Hien Gan, 'Effective VoIP call routing in WLAN and cellular integration,' IEEE Communications Letters, Oct. 2005
|
7 |
M.Manousos, S.Apostolacos, l.Grannnatikakis, D.Mexis, D.Kagklis, E.Sykas, 'Voice-quality monitoring and control for VoIP,' IEEE Internet Computing, July. 2005
|
8 |
S. Chatterjee, B. Tulu, T. Abhichandani, and Haiqing u, 'SIP-based enterprise converged networks for voice/video-over-IP: implementation and evaluation of components,' IEEE Journal on Selected Areas in Communications, Oct. 2005
|
9 |
E.Wedlund, H.schulzrinne, 'Mobility support using SIP,' in Second ACM/IEEE International Conference on Wireless and mobile Multimeida, Aug. 1999
|
10 |
H. Schulzrinne, J. Rosenberg, 'Internet telephony: Architecture and protocols-an IETF perpective,' Computer Networks and ISDN systems, Feb. 1999
|
11 |
Li C, Li S, Zhang D, and Chen G, 'Cryptanalysis of a data security protection scheme for VoIP,' IEE Proceedings Vision, Image and Signal Processing, Feb. 2006
|