Detail publikace

Analysis of Security Mechanisms for Voice over Internet Protocol Technology

Originální název

Analysis of Security Mechanisms for Voice over Internet Protocol Technology

Anglický název

Analysis of Security Mechanisms for Voice over Internet Protocol Technology

Jazyk

en

Originální abstrakt

This paper is focused on the analysis of the security mechanisms for the Voice over Internet Protocol technology. The importance of the security of multimedia data transfers is very often discussed issue nowadays. The possible attacks on the real-time transfers are mentioned in this paper and the basic requirements on the secure and reliable data transfer are specified too. The main part of this article is focused on the security analysis of the VoIP clients, which uses different security methods and protocols. The security levels of particular VoIP clients are introduced and compared in the conclusion.

Anglický abstrakt

This paper is focused on the analysis of the security mechanisms for the Voice over Internet Protocol technology. The importance of the security of multimedia data transfers is very often discussed issue nowadays. The possible attacks on the real-time transfers are mentioned in this paper and the basic requirements on the secure and reliable data transfer are specified too. The main part of this article is focused on the security analysis of the VoIP clients, which uses different security methods and protocols. The security levels of particular VoIP clients are introduced and compared in the conclusion.

BibTex


@inproceedings{BUT27212,
  author="Jiří {Hošek} and Karol {Molnár}",
  title="Analysis of Security Mechanisms for Voice over Internet Protocol Technology",
  annote="This paper is focused on the analysis of the security mechanisms for the Voice over Internet Protocol technology. The importance of the security of multimedia
data transfers is very often discussed issue nowadays. The possible attacks on the real-time transfers are mentioned in this paper and the basic requirements on the secure and reliable data transfer are specified too. The main part of this article is focused on the security analysis of the VoIP clients, which uses different security methods and protocols. The security levels of particular VoIP clients are introduced and compared in the conclusion.",
  booktitle="9-th International Conference - Research in Telecommunication Technology RTT - 2008",
  chapter="27212",
  edition="1",
  howpublished="electronic, physical medium",
  year="2008",
  month="september",
  pages="1--6",
  type="conference paper"
}