Voice over IPsec: Analysis and Solutions
ACSAC '02 Proceedings of the 18th Annual Computer Security Applications Conference
SP 800-58. Security Considerations for Voice Over IP Systems
SP 800-58. Security Considerations for Voice Over IP Systems
A practical architecture for implementing end-to-end QoS in an IP network
IEEE Communications Magazine
Assessing the risk of intercepting VoIP calls
Computer Networks: The International Journal of Computer and Telecommunications Networking
Multiple design patterns for voice over IP security
Proceedings of the International Conference on Advances in Computing, Communication and Control
On the importance of securing telephony systems
WSEAS TRANSACTIONS on COMMUNICATIONS
Modern telephony threats & countermeasures
ICCOM'08 Proceedings of the 12th WSEAS international conference on Communications
Journal of Network and Computer Applications
Remotely keyed cryptographics secure remote display access using (mostly) untrusted hardware
ICICS'05 Proceedings of the 7th international conference on Information and Communications Security
Language modeling and encryption on packet switched networks
EUROCRYPT'06 Proceedings of the 24th annual international conference on The Theory and Applications of Cryptographic Techniques
SIPAD: SIP-VoIP Anomaly Detection using a Stateful Rule Tree
Computer Communications
Performance of VoIP in Wired-Cum-Wireless Ethernet Network
International Journal of Interdisciplinary Telecommunications and Networking
Journal of Computer Security
Hi-index | 0.00 |
Although VoIP offers lower cost and greater flexibility, it can also introduce significant risks and vulnerabilities. This article explains the challenges of VoIP security and outlines steps for helping to secure an organization's VoIP network.