"1"^^ . . "[18183335EB4C]" . "Voice over IP; VoIP; security; attacks; threats; communication; Internet telephony"@en . "28120" . "This paper deals with problems of Internet telephony security. The current Internet architecture does not provide the same physical wire security as the phone lines. The key to securing VOIP is to use the security mechanisms like those deployed in data networks (firewalls, encryption, etc.) to emulate the security level currently enjoyed by PSTN network users. Voice over Internet Protocol, also called VoIP, is the routing of voice conversations over the Internet or through any other IP-based network. Companies providing VoIP service are commonly referred to as providers, and protocols which are used to carry voice signals over the IP network are commonly referred to as Voice over IP or VoIP protocols. It also contains description of basic properties and characteristics of Voice over IP technology, voice codec?s, real-time transport protocols and VoIP signaling protocols for establishing and managing calls. I also categorized possible threats and attacks and included their short descriptions and specif"@cs . . . . "RIV/70883521:28120/08:63507631" . "8"^^ . "V" . "Bezpe\u010Dnost VoIP syst\u00E9mu" . "Bezpe\u010Dnost VoIP syst\u00E9mu"@cs . . "357892" . "PL - Polsk\u00E1 republika" . "Rosman, Pavel" . "This paper deals with problems of Internet telephony security. The current Internet architecture does not provide the same physical wire security as the phone lines. The key to securing VOIP is to use the security mechanisms like those deployed in data networks (firewalls, encryption, etc.) to emulate the security level currently enjoyed by PSTN network users. Voice over Internet Protocol, also called VoIP, is the routing of voice conversations over the Internet or through any other IP-based network. Companies providing VoIP service are commonly referred to as providers, and protocols which are used to carry voice signals over the IP network are commonly referred to as Voice over IP or VoIP protocols. It also contains description of basic properties and characteristics of Voice over IP technology, voice codec?s, real-time transport protocols and VoIP signaling protocols for establishing and managing calls. I also categorized possible threats and attacks and included their short descriptions and specif" . "Bezpe\u010Dnost VoIP syst\u00E9mu"@cs . "VoIP Security System"@en . . "Bezpe\u010Dnost VoIP syst\u00E9mu" . . "Securitologia" . "7" . . "1898-4509" . "VoIP Security System"@en . . . . . . . . . "RIV/70883521:28120/08:63507631!RIV09-MSM-28120___" . . . "1"^^ . "This paper deals with problems of Internet telephony security. The current Internet architecture does not provide the same physical wire security as the phone lines. The key to securing VOIP is to use the security mechanisms like those deployed in data networks (firewalls, encryption, etc.) to emulate the security level currently enjoyed by PSTN network users. Voice over Internet Protocol, also called VoIP, is the routing of voice conversations over the Internet or through any other IP-based network. Companies providing VoIP service are commonly referred to as providers, and protocols which are used to carry voice signals over the IP network are commonly referred to as Voice over IP or VoIP protocols. It also contains description of basic properties and characteristics of Voice over IP technology, voice codec?s, real-time transport protocols and VoIP signaling protocols for establishing and managing calls. I also categorized possible threats and attacks and included their short descriptions and specif"@en .