Results 151 to 160 of about 21,969 (207)
Some of the next articles are maybe not open access.
Carrier VoIP Security Architecture
Networks 2006. 12th International Telecommunications Network Strategy and Planning Symposium, 2006This document describes a Security Architecture for Real-time Services over IP (RSoIP) Architecture. The architecture described here is used to protect AT&T's VoIP infrastructure, hence our liberal use of AT&T VoIP architecture in describing the proposed security architecture.
William Marshall +6 more
openaire +1 more source
2007 International Conference on Convergence Information Technology (ICCIT 2007), 2007
The rapid growth of computing, the Internet and telecommunications systems have resulted in a broad range of ways to communicate and access information. voice over Internet protocol (VoIP) is a computer telephony integration (CTI) solution that transports voice traffic over a data network as an alternative to the plain old telephone service (POTS ...
Alex Talevski +2 more
openaire +1 more source
The rapid growth of computing, the Internet and telecommunications systems have resulted in a broad range of ways to communicate and access information. voice over Internet protocol (VoIP) is a computer telephony integration (CTI) solution that transports voice traffic over a data network as an alternative to the plain old telephone service (POTS ...
Alex Talevski +2 more
openaire +1 more source
2010 2nd International Conference on Computer Engineering and Technology, 2010
Voice over IP (VoIP) has had a strong effect on global communications by allowing voice, data and images to travel over existing packet data networks along with traditional data packets. The convergence of voice and data in the same network brings both benefits and constraints to users.
Elhalifa Coulibaly, Lian Hao Liu
openaire +1 more source
Voice over IP (VoIP) has had a strong effect on global communications by allowing voice, data and images to travel over existing packet data networks along with traditional data packets. The convergence of voice and data in the same network brings both benefits and constraints to users.
Elhalifa Coulibaly, Lian Hao Liu
openaire +1 more source
VoIP security assessment: methods and tools
1st IEEE Workshop on VoIP Management and Security, 2006., 2006VoIP networks are cost efficient solutions for providing voice services and value added voice based services to both public and enterprise level users. The security of VoIP network is of major importance, since malicious usage can lead to major security incidents and associated costs.
Abdelnur, Humberto +3 more
openaire +2 more sources
Security Issues in VOIP Applications
2006 Canadian Conference on Electrical and Computer Engineering, 2006Recent Voice over Internet Protocol (VoIP) technology is attracting more and more attention and interest in the industry. VoIP applications such as IP telephony systems involve sending voice transmissions as data packets over private or public IP networks as well as reassembled and decoded on the receiving side.
Patrick C.K. Hung, Miguel Vargas Martin
openaire +1 more source
Infosecurity Today, 2005
Voice over IP (VoIP) is just another facet of the migration of business communications to an IP infrastructure but the technology raises some significant security issues.
openaire +1 more source
Voice over IP (VoIP) is just another facet of the migration of business communications to an IP infrastructure but the technology raises some significant security issues.
openaire +1 more source
VISOR: VoIP Security Using Reputation
2008 IEEE International Conference on Communications, 2008Voice over IP (VoIP) is an important step in communications. Along with the benefits of VoIP, such as high efficiency and low cost, come security challenges. Allowing access to the voice communication network over the Internet provides several new opportunities for attackers.
W. Yang, P. Judge
openaire +1 more source
International Journal of Information Security and Cybercrime
Nowadays, communication is based on a wide variety of solutions, especially using the real-time ones. People use a lot of online tools that offer them audio-video solutions, and the most important thing is that anyone has access to them, and there are easy to use.
openaire +1 more source
Nowadays, communication is based on a wide variety of solutions, especially using the real-time ones. People use a lot of online tools that offer them audio-video solutions, and the most important thing is that anyone has access to them, and there are easy to use.
openaire +1 more source
LB-VoIP: Enhancing access control of VoIP for secure networks
2015 International Telecommunication Networks and Applications Conference (ITNAC), 2015Voice over IP (VoIP) has attracted the attention of secure networks for its convenient deployment, easy management and multi-service carrying capability. However, security is a big problem that must be considered if VoIP is introduced into secure networks.
Bingjie Han +3 more
openaire +1 more source
Alliance Addresses VoIP Security
IEEE Security & Privacy Magazine, 2005The Voice over IP Security Alliance (VOIPSA) established in February 2005 has emerged to help organizations understand and mitigate VoIP security risks.
openaire +1 more source

