1 |
정보통신부, "VoIP 정보보호 가이드라인", 2006.12
|
2 |
M. Narbutt, A. Kelly, P. Perry, L. Murphy, "Adaptive VoIP playout scheduling: assessing user satisfaction," IEEE Internet Computing, July. 2005
|
3 |
국가사이버안전센터, "VoIP를 이용한 인터넷 전화의 이해와 보안대책", NCSC-TR050018
|
4 |
Steven M. Bellovin, Susan Landau, Matt Bla, "The real national-security needs for VoIP," Communications of the ACM, Nov. 2005
|
5 |
Yi Bing Lin, Whai En Chen, Chai Hien Gan, "Effective VoIP call routing in WLAN and cellular integration," IEEE Communications Letters, Oct. 2005
|
6 |
E. Wedlund, H. schulzrinne, "Mobility support using SIP," in Second ACM/IEEE International Conference on Wireless and mobile Multimeida, Aug. 1999
|
7 |
Time Green and Phil Hochmuth, VoIP security a moving target, Network World, 2004. 10
|
8 |
원유재, "VoIP 스팸 대응기술", 한국정보보호진흥원, 2007.6
|
9 |
Li C, Li S, Zhang D, and Chen G, "Cryptanalysis of a data security protection scheme for VoIP," IEE Proceedings Vision, Image and Signal Processing, Feb. 2006
|
10 |
김석훈 외, "VPN 기반의 음성 보안을 위한 인터넷 텔레포니(VoIP) 시스템 설계", 한국해양정보통신학회 논문지, 제 10권 5호, pp.942-949, 2006
과학기술학회마을
|
11 |
M.Manousos, S.Apostolacos, I.Grammatikakis, D.Mexis, D.Kagklis, E.Sykas, "Voice-quality monitoring and control for VoIP," IEEE Internet Computing, July. 2005
|
12 |
S. Chatterjee, B. Tulu, T. Abhichandani, and Haiqing Li, "SIP-based enterprise converged networks for voice/video-over-IP: implementation and evaluation of components," IEEE Journal on Selected Areas in Communications, Oct. 2005
|