This HTML5 document contains 42 embedded RDF statements represented using HTML+Microdata notation.

The embedded RDF content will be recognized by any processor of HTML5 Microdata.

Namespace Prefixes

PrefixIRI
dctermshttp://purl.org/dc/terms/
n5http://localhost/temp/predkladatel/
n16http://linked.opendata.cz/resource/domain/vavai/riv/tvurce/
n12http://linked.opendata.cz/ontology/domain/vavai/
shttp://schema.org/
skoshttp://www.w3.org/2004/02/skos/core#
n3http://linked.opendata.cz/ontology/domain/vavai/riv/
n15http://linked.opendata.cz/resource/domain/vavai/vysledek/RIV%2F70883521%3A28120%2F08%3A63507631%21RIV09-MSM-28120___/
n2http://linked.opendata.cz/resource/domain/vavai/vysledek/
rdfhttp://www.w3.org/1999/02/22-rdf-syntax-ns#
n4http://linked.opendata.cz/ontology/domain/vavai/riv/klicoveSlovo/
n17http://linked.opendata.cz/ontology/domain/vavai/riv/duvernostUdaju/
xsdhhttp://www.w3.org/2001/XMLSchema#
n10http://linked.opendata.cz/ontology/domain/vavai/riv/jazykVysledku/
n7http://linked.opendata.cz/ontology/domain/vavai/riv/aktivita/
n14http://linked.opendata.cz/ontology/domain/vavai/riv/druhVysledku/
n11http://linked.opendata.cz/ontology/domain/vavai/riv/obor/
n13http://reference.data.gov.uk/id/gregorian-year/

Statements

Subject Item
n2:RIV%2F70883521%3A28120%2F08%3A63507631%21RIV09-MSM-28120___
rdf:type
skos:Concept n12:Vysledek
dcterms:description
This paper deals with problems of Internet telephony security. The current Internet architecture does not provide the same physical wire security as the phone lines. The key to securing VOIP is to use the security mechanisms like those deployed in data networks (firewalls, encryption, etc.) to emulate the security level currently enjoyed by PSTN network users. Voice over Internet Protocol, also called VoIP, is the routing of voice conversations over the Internet or through any other IP-based network. Companies providing VoIP service are commonly referred to as providers, and protocols which are used to carry voice signals over the IP network are commonly referred to as Voice over IP or VoIP protocols. It also contains description of basic properties and characteristics of Voice over IP technology, voice codec?s, real-time transport protocols and VoIP signaling protocols for establishing and managing calls. I also categorized possible threats and attacks and included their short descriptions and specif This paper deals with problems of Internet telephony security. The current Internet architecture does not provide the same physical wire security as the phone lines. The key to securing VOIP is to use the security mechanisms like those deployed in data networks (firewalls, encryption, etc.) to emulate the security level currently enjoyed by PSTN network users. Voice over Internet Protocol, also called VoIP, is the routing of voice conversations over the Internet or through any other IP-based network. Companies providing VoIP service are commonly referred to as providers, and protocols which are used to carry voice signals over the IP network are commonly referred to as Voice over IP or VoIP protocols. It also contains description of basic properties and characteristics of Voice over IP technology, voice codec?s, real-time transport protocols and VoIP signaling protocols for establishing and managing calls. I also categorized possible threats and attacks and included their short descriptions and specif This paper deals with problems of Internet telephony security. The current Internet architecture does not provide the same physical wire security as the phone lines. The key to securing VOIP is to use the security mechanisms like those deployed in data networks (firewalls, encryption, etc.) to emulate the security level currently enjoyed by PSTN network users. Voice over Internet Protocol, also called VoIP, is the routing of voice conversations over the Internet or through any other IP-based network. Companies providing VoIP service are commonly referred to as providers, and protocols which are used to carry voice signals over the IP network are commonly referred to as Voice over IP or VoIP protocols. It also contains description of basic properties and characteristics of Voice over IP technology, voice codec?s, real-time transport protocols and VoIP signaling protocols for establishing and managing calls. I also categorized possible threats and attacks and included their short descriptions and specif
dcterms:title
Bezpečnost VoIP systému Bezpečnost VoIP systému VoIP Security System
skos:prefLabel
Bezpečnost VoIP systému VoIP Security System Bezpečnost VoIP systému
skos:notation
RIV/70883521:28120/08:63507631!RIV09-MSM-28120___
n3:aktivita
n7:V
n3:aktivity
V
n3:cisloPeriodika
7
n3:dodaniDat
n13:2009
n3:domaciTvurceVysledku
n16:2689421
n3:druhVysledku
n14:J
n3:duvernostUdaju
n17:S
n3:entitaPredkladatele
n15:predkladatel
n3:idSjednocenehoVysledku
357892
n3:idVysledku
RIV/70883521:28120/08:63507631
n3:jazykVysledku
n10:cze
n3:klicovaSlova
Voice over IP; VoIP; security; attacks; threats; communication; Internet telephony
n3:klicoveSlovo
n4:threats n4:Internet%20telephony n4:VoIP n4:communication n4:security n4:attacks n4:Voice%20over%20IP
n3:kodStatuVydavatele
PL - Polská republika
n3:kontrolniKodProRIV
[18183335EB4C]
n3:nazevZdroje
Securitologia
n3:obor
n11:AE
n3:pocetDomacichTvurcuVysledku
1
n3:pocetTvurcuVysledku
1
n3:rokUplatneniVysledku
n13:2008
n3:tvurceVysledku
Rosman, Pavel
s:issn
1898-4509
s:numberOfPages
8
n5:organizacniJednotka
28120