1 |
S. Yun, S. Park, “Study User Certification Techni-que of VoIP Service With a Certification Service," Korea Society for Internet Infomation, Conference 2008, vol.9, no.1, pp.117-212, May. 2008 (in Korean)
|
2 |
J. Fenton, "Analysis of Threats Motivating Domain Keys Identified Mail(DKIM)," IETF RFC 4686, September 2006
|
3 |
M. Wong and W, schlitt, "Sender Policy Frame-work(SPF) for Authorizing Use of Domains in E-Mail, Version 1," IETF RFC 4408, April 2006
|
4 |
“The Information Security Guide for VOIP,” Korea Internet & Security Agency, Dec. 2005
|
5 |
J. Choi, T. Jung, S. Jung, Y. Kim, "Implementation of a Secure VoIP System based on SIP," Journal of Information and Communication Society, vol.29, no.9B, pp.799-807, Sep. 2004 (in Korean)
|