We first discusses some threats to VoIP system and H. 323 architectures designed for VoIP communications on security point of view. Continues with presenting security requirements of VoIP, and explaining the essential...We first discusses some threats to VoIP system and H. 323 architectures designed for VoIP communications on security point of view. Continues with presenting security requirements of VoIP, and explaining the essential security constraints surrounding a seccessful VoIP deployment. Finally, suggests some strategies to implement the security and encryption functions of VoIP system based on H. 323. Key words VoIP - security - H. 323 protocol CLC number TP 393 Foundation item: Support by the National Natural Science Foundation of China (90104002)Biography: HUANG Yong-feng (1967-), male, postdoctoral fellow, research direction: multimedia communication based on IP protol.展开更多
文摘We first discusses some threats to VoIP system and H. 323 architectures designed for VoIP communications on security point of view. Continues with presenting security requirements of VoIP, and explaining the essential security constraints surrounding a seccessful VoIP deployment. Finally, suggests some strategies to implement the security and encryption functions of VoIP system based on H. 323. Key words VoIP - security - H. 323 protocol CLC number TP 393 Foundation item: Support by the National Natural Science Foundation of China (90104002)Biography: HUANG Yong-feng (1967-), male, postdoctoral fellow, research direction: multimedia communication based on IP protol.