VoIP Security System
The result's identifiers
Result code in IS VaVaI
<a href="https://www.isvavai.cz/riv?ss=detail&h=RIV%2F70883521%3A28120%2F08%3A63507631" target="_blank" >RIV/70883521:28120/08:63507631 - isvavai.cz</a>
Result on the web
—
DOI - Digital Object Identifier
—
Alternative languages
Result language
čeština
Original language name
Bezpečnost VoIP systému
Original language description
This paper deals with problems of Internet telephony security. The current Internet architecture does not provide the same physical wire security as the phone lines. The key to securing VOIP is to use the security mechanisms like those deployed in data networks (firewalls, encryption, etc.) to emulate the security level currently enjoyed by PSTN network users. Voice over Internet Protocol, also called VoIP, is the routing of voice conversations over the Internet or through any other IP-based network. Companies providing VoIP service are commonly referred to as providers, and protocols which are used to carry voice signals over the IP network are commonly referred to as Voice over IP or VoIP protocols. It also contains description of basic properties and characteristics of Voice over IP technology, voice codec?s, real-time transport protocols and VoIP signaling protocols for establishing and managing calls. I also categorized possible threats and attacks and included their short descrip
Czech name
Bezpečnost VoIP systému
Czech description
This paper deals with problems of Internet telephony security. The current Internet architecture does not provide the same physical wire security as the phone lines. The key to securing VOIP is to use the security mechanisms like those deployed in data networks (firewalls, encryption, etc.) to emulate the security level currently enjoyed by PSTN network users. Voice over Internet Protocol, also called VoIP, is the routing of voice conversations over the Internet or through any other IP-based network. Companies providing VoIP service are commonly referred to as providers, and protocols which are used to carry voice signals over the IP network are commonly referred to as Voice over IP or VoIP protocols. It also contains description of basic properties and characteristics of Voice over IP technology, voice codec?s, real-time transport protocols and VoIP signaling protocols for establishing and managing calls. I also categorized possible threats and attacks and included their short descrip
Classification
Type
J<sub>x</sub> - Unclassified - Peer-reviewed scientific article (Jimp, Jsc and Jost)
CEP classification
AE - Management, administration and clerical work
OECD FORD branch
—
Result continuities
Project
—
Continuities
V - Vyzkumna aktivita podporovana z jinych verejnych zdroju
Others
Publication year
2008
Confidentiality
S - Úplné a pravdivé údaje o projektu nepodléhají ochraně podle zvláštních právních předpisů
Data specific for result type
Name of the periodical
Securitologia
ISSN
1898-4509
e-ISSN
—
Volume of the periodical
—
Issue of the periodical within the volume
7
Country of publishing house
PL - POLAND
Number of pages
8
Pages from-to
—
UT code for WoS article
—
EID of the result in the Scopus database
—