论文部分内容阅读
We first discusses some threats to VolP system and H. 323 architectures designed for VolP communications on security point of view. Continues with presenting security requirements of VolP, and explaining the essential security constraints surrounding a su