Author:
Lee Seok-Pil,Nahm Eui-seok
Publisher
Springer Berlin Heidelberg
Reference6 articles.
1. Butcher, D., Xiangyang, L., Guo, G.J.: Security Challenge and Defense in VoIP Infrastructures. IEEE Trans. on Systems, Man, and Cybernetics 37(6), 1152–1162 (2007)
2. Edelson, E.: Voice over IP: Security pitfalls. Network Security (2), 4–7 (2005)
3. Hunter, P.: VoIP the latest security concern: DoS attack the greatest threat. Network Security (11), 5–7 (2002)
4. Shan, L., Jiang, N.: Research on Security Mechanisms of SIP-Based VoIP System. In: Proc. of Int. Conf. on Hybrid Intelligent Systems, vol. 2, pp. 408–410 (2009)
5. Yoon, S., Jeong, J., Jeong, H.: A study on the tightening the security of the key management protocol for VoIP. In: Proc. of New Trends in Information Science and Service Science, p. 638 (2010)