Sciweavers

265 search results - page 9 / 53
» Security Patterns for Voice over IP Networks
Sort
View
ISCC
2006
IEEE
147views Communications» more  ISCC 2006»
14 years 1 months ago
An Analytical Tool to Assess Readiness of Existing Networks for Deploying IP Telephony
Deploying IP telephony or voice over IP (VoIP) is a major and challenging task. This paper describes an analytical approach and tool to assess the readiness of existing IP network...
Khaled Salah, M. Almashari
CORR
2010
Springer
111views Education» more  CORR 2010»
13 years 8 months ago
Towards Public Key Infrastructure less authentication in Session Initiation Protocol
The Session Initiation Protocol (SIP) has become the most predominant protocol for Voice over Internet Protocol (VoIP) signaling. Security of SIP is an important consideration for...
Abdullah Al Hasib, Abdullah Azfar, Md. Sarwar Mors...
COMPSEC
2008
111views more  COMPSEC 2008»
13 years 8 months ago
An ontology-based policy for deploying secure SIP-based VoIP services
-- Voice services over Internet Protocol (VoIP) are nowadays much promoted by telecommunication and Internet service providers. However, the utilization of open networks, like the ...
Dimitris Geneiatakis, Costas Lambrinoudakis, Georg...
JCM
2007
123views more  JCM 2007»
13 years 7 months ago
Experimental Analysis of VoIP over Wireless Local Area Networks
—VoIP is a rapidly growing technology that enables the transport of voice over data networks such as the public Internet. VoIP became a viable alternative to the public switched ...
Abderrahmane Lakas, Mohammed Boulmalf
HICSS
2003
IEEE
125views Biometrics» more  HICSS 2003»
14 years 1 months ago
Applying a Layered Policy Model to IP Based Voice Services
Traditionally, specific telecommunications services were essentially confined to certain types of networks; e.g., television over broadcast networks or cable and voice service ove...
Douglas C. Sicker