VoIP Security Gets More Visible
IEEE Internet Computing
Strategies to Keep Your VoIP Network Secure
IT Professional
Improving Quality of VoIP Streams over WiMax
IEEE Transactions on Computers
Building an application-aware IPsec policy system
IEEE/ACM Transactions on Networking (TON)
SIP paging and tracking of wireless LAN hosts for VoIP
IEEE/ACM Transactions on Networking (TON)
New architecture and algorithms for fast construction of hose-model VPNs
IEEE/ACM Transactions on Networking (TON)
VoIP Deployment For Dummies
VoIP Handbook: Applications, Technologies, Reliability, and Security
VoIP Handbook: Applications, Technologies, Reliability, and Security
Voice quality prediction models and their application in VoIP networks
IEEE Transactions on Multimedia
An Overlay Architecture for High-Quality VoIP Streams
IEEE Transactions on Multimedia
IEEE Communications Magazine
Advances in wireless VoIP [Guest Editorial]
IEEE Communications Magazine
An enhanced SIP proxy server for wireless VoIP in wireless mesh networks
IEEE Communications Magazine
VoIP support using group resource allocation based on the UMB system
IEEE Communications Magazine
Performance Optimizations for Deploying VoIP Services in Mesh Networks
IEEE Journal on Selected Areas in Communications
Hi-index | 0.00 |
Voice over internet protocol (VoIP) provided voice service using Internet. It receives footlights when it escapes an initial curiosity. Interest to VoIP increased, because it can transfer existing phone service and deliver voice data through Internet technology. Communication service providers introduce Next Generation Network and Broadband convergence Network with VoIP as an added service to the consumer. In addition, session initiation protocol (SIP) service can be applied even outside the Internet phone service. However, it is needed to ensure secrecy of VoIP call in a special situation. It is relatively difficult to eavesdrop in the commonly used Public Switched Telephone Network (PSTN) as it is connected with 1:1 circuit. In this paper, we propose a new model of Internet telephone for eavesdrop prevention enabling VoIP (using SIP protocol) to use the virtual private network (VPN) protocol and establish the probability of practical use comparing it with Internet telephone. Copyright © 2010 John Wiley & Sons, Ltd.