VoIP protection techniques

This paper provides brief summary of threats and vulnerabilities of VoIP systems and architecture and provides overview of most used methods how to mitigate them. It also includes some interesting projects running nowadays that reflect latest development in this area.

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Matejka, J, Lábaj, Ondrej, Londák, Juraj, Podhradský, Pavol
Format: Tagungsbericht
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Beschreibung
Zusammenfassung:This paper provides brief summary of threats and vulnerabilities of VoIP systems and architecture and provides overview of most used methods how to mitigate them. It also includes some interesting projects running nowadays that reflect latest development in this area.
ISSN:1334-2630