All

What are you looking for?

All
Projects
Results
Organizations

Quick search

  • Projects supported by TA ČR
  • Excellent projects
  • Projects with the highest public support
  • Current projects

Smart search

  • That is how I find a specific +word
  • That is how I leave the -word out of the results
  • “That is how I can find the whole phrase”

VoIP Security System

The result's identifiers

  • Result code in IS VaVaI

    <a href="https://www.isvavai.cz/riv?ss=detail&h=RIV%2F70883521%3A28120%2F08%3A63507631" target="_blank" >RIV/70883521:28120/08:63507631 - isvavai.cz</a>

  • Result on the web

  • DOI - Digital Object Identifier

Alternative languages

  • Result language

    čeština

  • Original language name

    Bezpečnost VoIP systému

  • Original language description

    This paper deals with problems of Internet telephony security. The current Internet architecture does not provide the same physical wire security as the phone lines. The key to securing VOIP is to use the security mechanisms like those deployed in data networks (firewalls, encryption, etc.) to emulate the security level currently enjoyed by PSTN network users. Voice over Internet Protocol, also called VoIP, is the routing of voice conversations over the Internet or through any other IP-based network. Companies providing VoIP service are commonly referred to as providers, and protocols which are used to carry voice signals over the IP network are commonly referred to as Voice over IP or VoIP protocols. It also contains description of basic properties and characteristics of Voice over IP technology, voice codec?s, real-time transport protocols and VoIP signaling protocols for establishing and managing calls. I also categorized possible threats and attacks and included their short descrip

  • Czech name

    Bezpečnost VoIP systému

  • Czech description

    This paper deals with problems of Internet telephony security. The current Internet architecture does not provide the same physical wire security as the phone lines. The key to securing VOIP is to use the security mechanisms like those deployed in data networks (firewalls, encryption, etc.) to emulate the security level currently enjoyed by PSTN network users. Voice over Internet Protocol, also called VoIP, is the routing of voice conversations over the Internet or through any other IP-based network. Companies providing VoIP service are commonly referred to as providers, and protocols which are used to carry voice signals over the IP network are commonly referred to as Voice over IP or VoIP protocols. It also contains description of basic properties and characteristics of Voice over IP technology, voice codec?s, real-time transport protocols and VoIP signaling protocols for establishing and managing calls. I also categorized possible threats and attacks and included their short descrip

Classification

  • Type

    J<sub>x</sub> - Unclassified - Peer-reviewed scientific article (Jimp, Jsc and Jost)

  • CEP classification

    AE - Management, administration and clerical work

  • OECD FORD branch

Result continuities

  • Project

  • Continuities

    V - Vyzkumna aktivita podporovana z jinych verejnych zdroju

Others

  • Publication year

    2008

  • Confidentiality

    S - Úplné a pravdivé údaje o projektu nepodléhají ochraně podle zvláštních právních předpisů

Data specific for result type

  • Name of the periodical

    Securitologia

  • ISSN

    1898-4509

  • e-ISSN

  • Volume of the periodical

  • Issue of the periodical within the volume

    7

  • Country of publishing house

    PL - POLAND

  • Number of pages

    8

  • Pages from-to

  • UT code for WoS article

  • EID of the result in the Scopus database